Stephanie van Wissen is Editor and Copywriter at ON2IT. She has a background in communications and marketing. She loves to write, as well as explore other creature pursuits, such as TTRPGs and digital art.
How do you stop these modern bankrobbers from targeting your financial institution? In this Breaking the Bank episode of our Threat Talks podcast, our special guest and renowned cybersecurity expertย Jayson E. Streetย shares his experiences on how he ethically โrobsโ banks to reveal security weaknesses.
Cyberattacks on healthcare organizations can put patientsโ lives and entire organizations at risk. There are numerous reasons why cyber attackers seem to favour healthcare facilities as a target: private patient information is worth a lot of money, medical devices are easy entry points, and thereโs a lot of outdated technology.
There was a time when todayโs tech-giant Apple faced bankruptcy. What happened, and how did Apple get to where it is now despite facing adversity?
Join us on the latest episode of Threat Talks, aptly named ‘Authentication Apocalypse.’ Our hosts, Lieuwe Jan Koning and Luca Cipriano, explore the pressing topic of authentication with Harald Bosman, a seasoned endpoint engineer from AMS-IX.
In this โSuppy chain โ Business as usual?โ episode of Threat Talks, Lieuwe Jan Koning and Luca Cipriano dive into the escalating risk of supply chain attacks amid growing reliance on third-party and open-source software. Featuring insights from Matthijs Zwart, CIO and CISO of Vitens, the discussion explores the implications of these threats in critical sectors like water supply.
Adopting a transformative cybersecurity strategy can redefine business success. While the current adoption rate or Zero Trust โ a transformative cybersecurity strategy โ among large enterprises is just 1% as of January 2023, Gartner projects a growth to 10% by 2026.
DDoS attacks are orchestrated efforts where malicious actors aim to disrupt the normal flow of traffic to a specific server, service, or entire network. They flood the target with a torrent of internet trafficโmuch like those empty boxes in our scenarioโmaking it impossible for legitimate traffic to get through. These attacks can cripple websites, slow down services, or even bring them to a complete halt, affecting businesses and users alike.
With cybersecurity still a hot topic, news alerts about the latest data breach or security incident are hard to miss. Yet, even whilst being bombarded with these types of news items, many companies still think that theyโre somehow immune to such threats.
This optimism bias tends to come in three different flavors.
How DNB Increased Cyber Resilience in the Financial Sector Through Advanced Cyber Testing
This roundtable is intended for senior decision-makers in cybersecurity, risk and technology within the financial sector. All participation requests are reviewed to ensure a balanced, peer-level discussion.
Please complete the form below to request participation.
Zero Trust Readiness
Tailored incident tabletop exercise that adapts live based on your decisions, revealing true bottlenecks and clear improvements.
AI Readiness
Reveal true AI usage and build control without slowing down to embrace AI with confidence.
Adaptive Cyber Resilience Tabletop
Tailored incident tabletop exercise that adapts live based on your decisions, revealing true bottlenecks and clear improvements.
Incident Response
Crisis coordination and hands-on support by our experienced CSIRT during major security incidents.
Complete the form to get yourXDR Readiness Checklist.
Complete the form to request your CRQ Assessment.
Complete the form to get yourReal MDRโข Walkthrough.
Hack The Boat – Demo Request
Fill out your details below and we’ll be in touch within one business day.
Hack The Hospital – Demo Request
Fill out your details below and we’ll be in touch within one business day.
Download – How to reduce cyber risks and lower cyber insurance premiums
Cortex XDR – Contact Form
Fill out your details below and we’ll be in touch within one business day.
The Real MDRโข – Contact Form
Fill out your details below and we’ll be in touch within one business day.
On-Demand Webinar - Cybersecurity Opportunities in 2025
Fill in your details below to access the on-demand webinar:
On-Demand Webinar - Rethinking Incident Response with Zero Trust
Fill in your details below to access the on-demand webinar:
On-Demand Webinar - Where to spend your Security Budget
Fill in your details below to access the on-demand webinar:
On-Demand Webinar - SaaS โ Security as a Shortcut
Fill in your details below to access the on-demand webinar:
Download - MDR Brochure
Datasheet - Incident Response Readiness
On-Demand Webinar - Opportunities for Community Banks
Fill in your details below to access the on-demand webinar: