Testing software with production data? Anonymize first Testing software with data from your production environment? If this data contains personal data, you must have specific permission from...
Automated pen testing: how and why? As data breaches become increasingly common within corporate networks that are becoming more complex by the day, it is imperative that organizations have a robust line of defense...
ISO 27001:2022 and ISO 27002:2022. What will change? The information security management standard ISO 27001 and its code of practice ISO 27002 were last updated nearly a decade ago. A new version...
Why is IAM so important to my Cybersecurity? Companies without concrete Identity and Access Management (IAM) programs go 40% spending more on IAM-related issues, while achieving less than companies with solid IAM processes....
From exercise science to Security Consultant: Gabriela has changed tack Gabriela started the Security Consultant traineeship almost 5 months ago. Are you curious how she experienced it and what she learned? Then read on here!
Why an integrated Cybersecurity strategy is essential Following the changes brought about by the pandemic in business, organizations have significantly increased their use of data and the Internet. As a result of what we now know as the new-normal, cyber attacks and...
Phishing: Am I protected against cybercrime? Phishing is a worrying phenomenon in the business world, as a successful phishing attack can have significant consequences for an organization. Financial loss, reputational damage and...
How is ISO 27001 implemented? In this article, we will take you through the world of ISO 27001 implementation, the ISMS, the benefits, the investment and how to maintain an ISMS.