top of page
Search

Mike van der Bijl
Oct 30, 20247 min read
Securing the Future: DevSecOps and OWASP SAMM in the Era of technical revolution
In the era of unprecedented digitization, where technology deeply penetrates into our society and organizations, software has become the...
0 comments

Mike van der Bijl
Oct 11, 20246 min read
Navigating NIS2: Essential Preparations and Implications for Your Organization
NIS2 is on the horizon, but what should you or your organization do? Which measures need to be taken? Unfortunately the exact guidelines...
0 comments


Coen Goedegebure
Feb 12, 202412 min read
Surviving a cyber security job interview (Cryptography)
This article answers 14 typical questions about cryptography you may get during a job interview for a security position
0 comments


Niels van Nieuwenburg
Aug 8, 20227 min read
5 ways to improve your cyber security now - Software Developer edition
You probably hear it a lot: you should make your code secure! But…​ how? When it comes to security, there are a plethora of measures you...
0 comments


Coen Goedegebure
Nov 15, 20213 min read
5 Phases of hacking
The process of a typical attack scenario can be broken down into five distinct phases. This article describes the details of each phase.
0 comments


Coen Goedegebure
Nov 15, 20213 min read
Why your company will be hacked
This article highlights a short list of common reasons why companies get hacked and why data breaches occur.
0 comments


Coen Goedegebure
Nov 15, 20214 min read
Trojans in your source code
Be aware of the dangers of hidden Unicode control characters and how they can make your source code appear differently than it is executed
0 comments
bottom of page