Stephanie van Wissen

Author

Stephanie van wissen

Stephanie van Wissen is Editor and Copywriter at ON2IT. She has a background in communications and marketing. She loves to write, as well as explore other creature pursuits, such as TTRPGs and digital art.

LinkedIn

Blogs By Stephanie van Wissen

Join us on the latest episode of Threat Talks, aptly named ‘Authentication Apocalypse.’ Our hosts, Lieuwe Jan Koning and Luca Cipriano, explore the pressing topic of authentication with Harald Bosman, a seasoned endpoint engineer from AMS-IX.
In this โ€˜Suppy chain โ€“ Business as usual?โ€™ episode of Threat Talks, Lieuwe Jan Koning and Luca Cipriano dive into the escalating risk of supply chain attacks amid growing reliance on third-party and open-source software. Featuring insights from Matthijs Zwart, CIO and CISO of Vitens, the discussion explores the implications of these threats in critical sectors like water supply.
Adopting a transformative cybersecurity strategy can redefine business success. While the current adoption rate or Zero Trust โ€“ a transformative cybersecurity strategy โ€“ among large enterprises is just 1% as of January 2023, Gartner projects a growth to 10% by 2026.
DDoS attacks are orchestrated efforts where malicious actors aim to disrupt the normal flow of traffic to a specific server, service, or entire network. They flood the target with a torrent of internet trafficโ€”much like those empty boxes in our scenarioโ€”making it impossible for legitimate traffic to get through. These attacks can cripple websites, slow down services, or even bring them to a complete halt, affecting businesses and users alike.
With cybersecurity still a hot topic, news alerts about the latest data breach or security incident are hard to miss. Yet, even whilst being bombarded with these types of news items, many companies still think that theyโ€™re somehow immune to such threats. This optimism bias tends to come in three different flavors.
For enterprises large and small, remote access is no longer a luxury; it’s an imperative. The once-crystal-clear boundaries between “work” and “home” have blurred, creating a tapestry of workspaces as diverse as the people who populate them.
Ransomware
Letโ€™s assume for a moment that, one day, perhaps sooner, perhaps later, you will face the reality of a ransomware attack. Chances are that, in the moment, your cybersecurity team will turn to you as the decision maker.
An image of cybersecurity heroes in Hollywood.
Hollywood has a knack for dramatizing the digital battlefield. Letโ€™s peel back the Hollywood faรงade and shine a light on what cybersecurity really looks like in the command centers of SOCs and CSIRTS.