Security, Brand Protection

Waarom het begrip Zero-Day van belang is

No one wants to be the first to face a new cyberattack. Let’s face it, the potential for being the first organization to be hit with the next creative zero-day cyberattack strikes fear into the heart of every CISO and IT security professional.…

Meer informatie
Security, Cyber Resilience for Email, Email Security

Verbeter de dreigingsdetectie en -respons met SIEM Integration

Add email security data into SIEM solutions for improved threat intelligence and response. Email is a catch 22. It’s the number one business communication tool and the number one cyberattack vector. As the lifeblood that keeps business running…

Meer informatie
Security, Email Security

De cyberkloof overbruggen – U bent de zwakste schakel in de keten

Cyberattackers are going after you to get to your biggest customers. Welcome to the latest installment of Bridging the Cyber Divide, our blog series focused on helping IT professionals at small-to-medium sized organizations make the case for enhance…

Meer informatie
Security, Brand Protection

Threat Intelligence: 5 manieren om waarde te bewijzen

You can do threat intelligence—even with a small budget. Editor’s Note: As part of an ongoing series, Threat Intelligence for You, we’re asking thought leaders in the Cyber Resilience Think Tank their thoughts about threat intellig…

Meer informatie
Security, Email Security

Cyberdreigingen kosten meer dan u zich kunt indenken

The costs of attacks are rising at an alarming rate. We've talked about how “Ignoring Cybersecurity Can Cost Millions” and highlighted how one US power company was fined $2.7 million over data exposure. This was just one of hun…

Meer informatie
Archiving, Office-365, Archive and Data Protection, Office-365

Back-up en herstel van Office 365 in het Ransomware-tijdperk

The Old World Meets the New When It Comes to Backup and Recovery Many of us have the made the journey to Microsoft Office 365™ or are planning to do so soon. Many questions await us: how secure is it, who’s responsible for managing our d…

Meer informatie
Office-365, Email Security, Office-365

De problemen met multi-factorauthenticatie van Office 365/Azure resulteren in downtime

“@Microsoft: please don’t ruin Thanksgiving.” Ah, Thanksgiving. Typically, a week full of family travels, exercising booked vacation time and in some cases, thinking ahead to bargain deals on Friday. But now, it’s perhaps not…

Meer informatie
Security, Email Security

De definitie van innovatieve cyberbedreigingspreventie

You've heard it all. Until now. By now, you have probably been exposed to every promise, sales pitch, marketing hype and yes, even technological wonder when it comes to new security solutions to old (and very pervasive) problems. However, disruptin…

Meer informatie
Security, Email Security

Een betere sandbox voor e-mailbeveiliging

You need the best security technology in today’s market. It’s no secret that kids love to get dirty and especially while playing in a sandbox, so much so that there are dozens of videos showing how to build the best sandbox for just this…

Meer informatie
Security, Threat Intelligence Hub

Threat Intelligence: uitdagingen en voordelen

What can threat intelligence mean for your organization? Editor’s note: Threat intelligence. It’s been one of the most talked-about themes in the cybersecurity space for years now. But what does it mean to you, and what can it mean for y…

Meer informatie