Stephanie van Wissen

Author

Stephanie van wissen

Stephanie van Wissen is Editor and Copywriter at ON2IT. She has a background in communications and marketing. She loves to write, as well as explore other creature pursuits, such as TTRPGs and digital art.

LinkedIn

Blogs By Stephanie van Wissen

If youโ€™ve read any cybersecurity articles lately, youโ€™ve likely come across the term โ€˜ever-evolving cyber threat landscape.โ€™ Itโ€™s one of those phrases that gets thrown around a lot โ€“ especially in AI generated content โ€“ almost to the point of sounding clichรฉ. But here’s the truth: as clichรฉ as it may sound, it’s not just a buzzword.
Even if youโ€™re an IT professional feeling a bit skeptical about the boardโ€™s intentions, you can still see that their involvement is a great chance to align security measures with the companyโ€™s broader goals. Itโ€™s all aboutย framing this as a partnership,ย not a critique. One of the best ways to do that is through a cybersecurity assessment that actually makes sense.
How do you stop these modern bankrobbers from targeting your financial institution? In this Breaking the Bank episode of our Threat Talks podcast, our special guest and renowned cybersecurity expertย Jayson E. Streetย shares his experiences on how he ethically โ€œrobsโ€ banks to reveal security weaknesses.
Cyberattacks on healthcare organizations can put patientsโ€™ lives and entire organizations at risk. There are numerous reasons why cyber attackers seem to favour healthcare facilities as a target: private patient information is worth a lot of money, medical devices are easy entry points, and thereโ€™s a lot of outdated technology.
There was a time when todayโ€™s tech-giant Apple faced bankruptcy. What happened, and how did Apple get to where it is now despite facing adversity?
Join us on the latest episode of Threat Talks, aptly named ‘Authentication Apocalypse.’ Our hosts, Lieuwe Jan Koning and Luca Cipriano, explore the pressing topic of authentication with Harald Bosman, a seasoned endpoint engineer from AMS-IX.
In this โ€˜Suppy chain โ€“ Business as usual?โ€™ episode of Threat Talks, Lieuwe Jan Koning and Luca Cipriano dive into the escalating risk of supply chain attacks amid growing reliance on third-party and open-source software. Featuring insights from Matthijs Zwart, CIO and CISO of Vitens, the discussion explores the implications of these threats in critical sectors like water supply.
Adopting a transformative cybersecurity strategy can redefine business success. While the current adoption rate or Zero Trust โ€“ a transformative cybersecurity strategy โ€“ among large enterprises is just 1% as of January 2023, Gartner projects a growth to 10% by 2026.