LinkedIn will soon train AI models with your data unless you take action Your name, photo, current position, previous work experience and whatever else you put on your LinkedIn profile is soon going to be used by LinkedIn to...
What does the acquisition of Zivver mean for your organization? Follow the Money's investigation into the acquisition of communications software Zivver, caused a stir among government organizations and cybersecurity experts. Zivver...
Gemeentelek underscores need for strict control of file entries Institutions such as hospitals, governments and municipalities bear a great responsibility when it comes to protecting your personal data. U...
Cyber security bill (NIS2) submitted to House of Representatives: entry into force in 2026 On June 2, 2025, the bill for the Cybersecurity Act was officially submitted to the House of Representatives. This law implements the...
Control of file inspection: Ommelander Hospital Groningen secures patient privacy with Logspect Patients should be able to trust that their medical records are in safe and trusted hands with the health care provider. That's what ...
From Trainee to Security Consultant Wendy's focus on information security grew during her HBO-ICT studies, which is why she chose the Security Consultant traineeship. Since then, she has...
Data at risk from use of AI chatbots It is happening more and more; employees using AI chatbots to quickly draft an email or write a summary....
Hacked, now what? You can no longer send emails, important data is no longer accessible, and backups are encrypted. You have been hacked,...
How do you make sure your business keeps running? Your biggest fear is that your organization's IT systems are failing. The survival of your business, of course, is...
Cybersecurity and Drivers: how the NIS2 increases your accountability The NIS2 is coming! This means that not only your organization, but also you as a director must meet strict requirements...