Cybersecurity blog

News, articles and thought leadership.

Recently published blogs

Hack the Boat blog

Though the recent Baltimore bridge collision wasn’t a cyber-attack, it did showcase a serious vulnerability in ship systems. A vulnerablity that could’ve easily been exploited by hackers, highlighting a truth that can no longer be denied – ships are easy targets for cybercriminals.

In these cyber warfare episodes of Threat Talks, we explore whether or not we stand a chance in this continuous arms race in cyber technologies, what Advanced Persistent Threats (APTs) are, and how these modern threats can affect literally everyone.

PwC’s Dutch CEO Survey shows that 56% of Dutch CEOs are very concerned about cyber risks. The Allianz Risk Barometer lists cyber incidents as the biggest worry for companies globally and Gartner’s 2023 Top Cybersecurity Trends reports that business leaders are recognizing cybersecurity as a top business risk, yet organizations still struggle with implementing the necessary measures to mitigate risks.

If you’ve read any cybersecurity articles lately, you’ve likely come across the term ‘ever-evolving cyber threat landscape.’ It’s one of those phrases that gets thrown around a lot – especially in AI generated content – almost to the point of sounding cliché. But here’s the truth: as cliché as it may sound, it’s not just a buzzword.

Even if you’re an IT professional feeling a bit skeptical about the board’s intentions, you can still see that their involvement is a great chance to align security measures with the company’s broader goals. It’s all about framing this as a partnership, not a critique. One of the best ways to do that is through a cybersecurity assessment that actually makes sense.

How do you stop these modern bankrobbers from targeting your financial institution? In this Breaking the Bank episode of our Threat Talks podcast, our special guest and renowned cybersecurity expert Jayson E. Street shares his experiences on how he ethically “robs” banks to reveal security weaknesses.

Though Zero Trust is here to stay, that doesn’t mean implementation is easy. Rob Maas is one of the leading Zero Trust consultants and the Field CTO at ON2IT. In this second part of his blog series he answers the question: what part does business alignment play in cybersecurity implementations?

Cyberattacks on healthcare organizations can put patients’ lives and entire organizations at risk. There are numerous reasons why cyber attackers seem to favour healthcare facilities as a target: private patient information is worth a lot of money, medical devices are easy entry points, and there’s a lot of outdated technology.

There was a time when today’s tech-giant Apple faced bankruptcy. What happened, and how did Apple get to where it is now despite facing adversity?

Join us on the latest episode of Threat Talks, aptly named ‘Authentication Apocalypse.’ Our hosts, Lieuwe Jan Koning and Luca Cipriano, explore the pressing topic of authentication with Harald Bosman, a seasoned endpoint engineer from AMS-IX.

In this ‘Suppy chain – Business as usual?’ episode of Threat Talks, Lieuwe Jan Koning and Luca Cipriano dive into the escalating risk of supply chain attacks amid growing reliance on third-party and open-source software. Featuring insights from Matthijs Zwart, CIO and CISO of Vitens, the discussion explores the implications of these threats in critical sectors like water supply.

Adopting a transformative cybersecurity strategy can redefine business success. While the current adoption rate or Zero Trust – a transformative cybersecurity strategy – among large enterprises is just 1% as of January 2023, Gartner projects a growth to 10% by 2026.

DDoS attacks are orchestrated efforts where malicious actors aim to disrupt the normal flow of traffic to a specific server, service, or entire network. They flood the target with a torrent of internet traffic—much like those empty boxes in our scenario—making it impossible for legitimate traffic to get through. These attacks can cripple websites, slow down services, or even bring them to a complete halt, affecting businesses and users alike.

With cybersecurity still a hot topic, news alerts about the latest data breach or security incident are hard to miss. Yet, even whilst being bombarded with these types of news items, many companies still think that they’re somehow immune to such threats. This optimism bias tends to come in three different flavors.
Two puzzle pieces demonstrate integration of VPN and firewalls.

Integrating various network functions within a single device, such as combining VPN (Virtual Private Network) capabilities with firewalls, has become a common practice over the past few years. This consolidation offers benefits in terms of platform security features (i.e. user-based policies and Layer 7 inspection), simplicity and cost-effectiveness.

KEEP UP WITH

OUR LATEST RESEARCH

Name(Required)
Email(Required)