top of page
Zoeken

The best resources to get your CISSP
It's all about practicing questions Earning your CISSP is challenging—it demands lots of studying, practicing questions, and the right...
Jelle Ermerins
25 nov 20242 minuten om te lezen
3 opmerkingen

Securing the Future: DevSecOps and OWASP SAMM in the Era of technical revolution
In the era of unprecedented digitization, where technology deeply penetrates into our society and organizations, software has become the...
Mike van der Bijl
13 nov 20247 minuten om te lezen
2 opmerkingen

Navigating NIS2: Essential Preparations and Implications for Your Organization
NIS2 is on the horizon, but what should you or your organization do? Which measures need to be taken? Unfortunately the exact guidelines...
Mike van der Bijl
13 nov 20246 minuten om te lezen
1 opmerking


Surviving a cyber security job interview (Cryptography)
This article answers 14 typical questions about cryptography you may get during a job interview for a security position
Coen Goedegebure
12 feb 202412 minuten om te lezen
3 opmerkingen


5 ways to improve your cyber security now - Software Developer edition
You probably hear it a lot: you should make your code secure! But…​ how? When it comes to security, there are a plethora of measures you...
Niels van Nieuwenburg
8 aug 20227 minuten om te lezen
4 opmerkingen


Trojans in your source code
Be aware of the dangers of hidden Unicode control characters and how they can make your source code appear differently than it is executed
Coen Goedegebure
11 nov 20214 minuten om te lezen
22 opmerkingen


Why your company will be hacked
This article highlights a short list of common reasons why companies get hacked and why data breaches occur.
Coen Goedegebure
9 nov 20213 minuten om te lezen
3 opmerkingen


5 Phases of hacking
The process of a typical attack scenario can be broken down into five distinct phases. This article describes the details of each phase.
Coen Goedegebure
1 nov 20213 minuten om te lezen
3 opmerkingen
bottom of page