Skip to content
ON2IT Zero Trust Innovators
ON2IT Zero Trust Innovators
  • Our Solutions
    • MDR Detectâ„¢
    • Cyber Risk Quantification
    • Zero Trust
    • Cybersecurity Services
    • Incident Response
    • Managed Security Services
  • Resources
    • Content
      • E-Books & Datasheets
      • ON2IT News Hub
      • Blog
      • Threat Talks Podcast
    • Events
      • Webinars & Events
      • On-Demand Cyber Sessions
      • Training Courses
    • ON2IT Research Groups
    • ‘Hack the’ Demos
      • Hack the Hospital Demo
      • Hack the Boat Demo
  • About
    • About ON2IT
    • Working at
      • Careers at ON2IT
      • We are ON2IT
    • Contact
  • EN
    • NL

Trends and Reports

Why Hospital Cybersecurity Fails on Paper (and in Practice)

March 2, 2026

Why hospital cybersecurity can look compliant and still be operationally fragile. Insights from a closed CISO roundtable on OT blind spots, vendor access, and availability-driven risk.

MDR vs EDR vs XDR: Making sense of cybersecurity’s acronym soup

February 17, 2026

Confused by MDR vs EDR vs XDR? Learn what these cybersecurity acronyms really mean, how they differ, and why Managed Detection and Response matters for business risk and accountability.

Cybersecurity awareness in 2026 meets NIS2

February 3, 2026February 3, 2026

Cybersecurity awareness in 2026 goes beyond training. See how CISOs should address AI risk, NIS2 compliance, and supply chain threats.

Modern MDR: Threat Detection That Starts at Ingestion

January 21, 2026

Sub-second detection reduces attacker dwell time by analyzing threats at log ingestion. Learn how real-time detection stops lateral movement and operational risk before it’s too late.

Cybersecurity Predictions for 2026: From Reaction to Prevention

Cybersecurity Predictions for 2026: From Reaction to Prevention

December 30, 2025

In 2026, prevention overtakes reaction as AI-driven threats scale. Explore the key cybersecurity predictions shaping Zero Trust, exposure reduction, and resilience.

Cybersecurity in 2025: AI Attacks, Ransomware at Scale, and Board-Level Risk

December 23, 2025

In 2025, cybersecurity changed fast. AI-driven attacks scaled, ransomware industrialized, and regulation made cyber risk a board-level issue. Here’s what changed – and what leaders must do before 2026.

Older posts
Page1 Page2 … Page8 Next →

TABLE OF CONTENTS

  1. Summary
  2. The 2025 Threat Landscape: What Actually Changed
  3. Defensive Trends in 2025: Progress Without Advantage
  4. What Cybersecurity Leaders Must Take From 2025
  5. Looking Ahead: Why 2026 Won’t Slow Down

Zero Trust Innovators

24/7 Global SOC

20+ Years of Cybersecurity

GOT A QUESTION?

GET IN TOUCH

ON2IT

About ON2IT
ON2IT News Hub
Careers
Contact
Privacy Notice & Cookie Settings
Responsible disclosure
Trust Center

Solutions

Zero Trust as a Service
AUXOâ„¢
mSOCâ„¢
Cortex XDR

Resources

Blog
Events & Webinars
On-Demand Cyber Sessions
ON2IT Research Groups
Guides & Papers
Datasheets

Managed Cybersecurity

Controls Management
Protect Surface Management
Event Management
Incident Management
Improvement Management
Compliance Management

Managed Security Services

Managed Cloud Security
Managed Endpoint Security
Managed IoT Security
Managed SASE

Social media

LinkedIn YouTube Spotify - Threat Talks YouTube - Threat Talks
Copyright © ON2IT | Zero Trust Innovators

How DNB Increased Cyber Resilience in the Financial Sector Through Advanced Cyber Testing

This roundtable is intended for senior decision-makers in cybersecurity, risk and technology within the financial sector. All participation requests are reviewed to ensure a balanced, peer-level discussion.

Please complete the form below to request participation.

This field is for validation purposes and should be left unchanged.
Name(Required)
Business Email(Required)
Have a question for u? Ask away.

Zero Trust Readiness

Tailored incident tabletop exercise that adapts live based on your decisions, revealing true bottlenecks and clear improvements.

This field is for validation purposes and should be left unchanged.
Name(Required)
To make sure you don’t have to fill out multiple forms, please list any potential additional services below, and we’ll be sure to inform you about those as well.
We will treat all your data confidentially (see our privacy policy).

AI Readiness

Reveal true AI usage and build control without slowing down to embrace AI with confidence.

This field is for validation purposes and should be left unchanged.
Name(Required)
To make sure you don’t have to fill out multiple forms, please list any potential additional services below, and we’ll be sure to inform you about those as well.
We will treat all your data confidentially (see our privacy policy).

Adaptive Cyber Resilience Tabletop

Tailored incident tabletop exercise that adapts live based on your decisions, revealing true bottlenecks and clear improvements.

This field is for validation purposes and should be left unchanged.
Name(Required)
To make sure you don’t have to fill out multiple forms, please list any potential additional services below, and we’ll be sure to inform you about those as well.
We will treat all your data confidentially (see our privacy policy).

Incident Response

Crisis coordination and hands-on support by our experienced CSIRT during major security incidents.

This field is for validation purposes and should be left unchanged.
Name(Required)
To make sure you don’t have to fill out multiple forms, please list any potential additional services below, and we’ll be sure to inform you about those as well.
We will treat all your data confidentially (see our privacy policy).

Complete the form to get your XDR Readiness Checklist.

This field is for validation purposes and should be left unchanged.
Name(Required)

Complete the form to request your CRQ Assessment.

This field is for validation purposes and should be left unchanged.
Name(Required)
Business Email(Required)

Complete the form to get your Real MDRâ„¢ Walkthrough.

This field is for validation purposes and should be left unchanged.
Name(Required)

Hack The Boat – Demo Request

Fill out your details below and we’ll be in touch within one business day.

This field is for validation purposes and should be left unchanged.
Name(Required)
Business Email(Required)

Hack The Hospital – Demo Request

Fill out your details below and we’ll be in touch within one business day.

This field is for validation purposes and should be left unchanged.
Name(Required)
Business Email(Required)

Download – How to reduce cyber risks and lower cyber insurance premiums

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

Cortex XDR – Contact Form

Fill out your details below and we’ll be in touch within one business day.

This field is for validation purposes and should be left unchanged.
What would you like to learn more about?(Required)
Name(Required)

The Real MDRâ„¢ – Contact Form

Fill out your details below and we’ll be in touch within one business day.

This field is for validation purposes and should be left unchanged.
What would you like to learn more about?(Required)
Name(Required)
On-Demand Webinar - Cybersecurity Opportunities in 2025

Fill in your details below to access the on-demand webinar:

This field is for validation purposes and should be left unchanged.
Name(Required)
Sign up for the ON2IT newsletter and watch the webinar.(Required)
Our privacy notice describes how we process your personal data.

On-Demand Webinar - Rethinking Incident Response with Zero Trust

Fill in your details below to access the on-demand webinar:

This field is for validation purposes and should be left unchanged.
Name(Required)
Sign up for the ON2IT newsletter and watch the webinar.(Required)
Our privacy notice describes how we process your personal data.

On-Demand Webinar - Where to spend your Security Budget

Fill in your details below to access the on-demand webinar:

This field is for validation purposes and should be left unchanged.
Name(Required)
Sign up for the ON2IT newsletter and watch the webinar.(Required)
Our privacy notice describes how we process your personal data.

On-Demand Webinar - SaaS ≠ Security as a Shortcut

Fill in your details below to access the on-demand webinar:

This field is for validation purposes and should be left unchanged.
Name(Required)
Sign up for the ON2IT newsletter and watch the webinar.(Required)
Our privacy notice describes how we process your personal data.

Download - MDR Brochure

This field is for validation purposes and should be left unchanged.
Name(Required)
Our privacy notice describes how we process your personal data.(Required)
Our privacy notice describes how we process your personal data.

Datasheet - Incident Response Readiness

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

On-Demand Webinar - Opportunities for Community Banks

Fill in your details below to access the on-demand webinar:

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

Managed-Prisma-Access

Download our Managed Prisma Access latest Datasheet

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

IoT Reach and Risk assessment

Do the IoT Risk Assesment and take the next steps to securing our organisation

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

On-Demand Webinar - From Compliance Pain to Competitive Gain

Fill in your details below to access the on-demand webinar:

This field is for validation purposes and should be left unchanged.
Name(Required)
Sign up for the ON2IT newsletter and watch the webinar.(Required)
Our privacy notice describes how we process your personal data.

Request a no-obligation quote

This field is for validation purposes and should be left unchanged.
Name

Incident Response

How to improve your Cybersecurity Incident Response procedure: what best suits you and your organization.

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

Download the Zero Trust RFC guide

Improve your organization’s cyber resilience, choose the Zero Trust route that best suits you.

Zero Trust RFC Brochure

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

Request a no-obligation quote

This field is for validation purposes and should be left unchanged.
Name
Zero Trust service(Required)

Fast-Track your Zero Trust Cybersecurity datasheet

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

Download Infographic - Introduction on Zero Trust

This field is for validation purposes and should be left unchanged.
Consent(Required)
Our privacy notice describes how we process your personal data.

Download the Zero Trust as a Service datasheet

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

 

Download the Zero Trust Coaching datasheet

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

Download the Zero Trust Fast Track datasheet

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

Download the Zero Trust Readiness datasheet

This field is for validation purposes and should be left unchanged.
Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.

Request a quote

Training course quote - PAN EDU (EN)

  • This field is for validation purposes and should be left unchanged.

Join our cybersecurity newsletter

Stay up to date on the latest cybersecurity news and trends.

Name(Required)
Consent(Required)
Our privacy notice describes how we process your personal data.