Mike van der BijlOct 116 min readNavigating NIS2: Essential Preparations and Implications for Your Organization NIS2 is on the horizon, but what should you or your organization do? Which measures need to be taken? Unfortunately the exact guidelines...
Coen GoedegebureFeb 1212 min readCYBER SECURITYSurviving a cyber security job interview (Cryptography)This article answers 14 typical questions about cryptography you may get during a job interview for a security position
Niels van NieuwenburgAug 8, 20227 min readCYBER SECURITY5 ways to improve your cyber security now - Software Developer editionYou probably hear it a lot: you should make your code secure! But… how? When it comes to security, there are a plethora of measures you...
Coen GoedegebureNov 15, 20213 min read5 Phases of hackingThe process of a typical attack scenario can be broken down into five distinct phases. This article describes the details of each phase.
Coen GoedegebureNov 15, 20213 min readWhy your company will be hackedThis article highlights a short list of common reasons why companies get hacked and why data breaches occur.
Coen GoedegebureNov 15, 20214 min readTrojans in your source codeBe aware of the dangers of hidden Unicode control characters and how they can make your source code appear differently than it is executed