Zero Trust Innovators

We offer worldwide managed cybersecurity services for organizations with complex and dynamic IT infrastructures. Our managed services are modular, scalable and cost-effective, and always based on Zero Trust.

Read more
Lunch & Learn - Cloud Security

Cybersecurity webinars

Every month we organize webinars on different cybersecurity topics.
Below you will find a selection of the current offerings.

Zero Trust Strategy & Operation webinar

webinar, our Lead Architect and CISO will discuss the noticeable shift from an operational approach to Zero Trust to the strategic level at which CISOs and CIOs operate.

More information
Webinar - Automated Pentesting

Pentesting is often seen as a necessary evil for audits. It is also a challenge to get the right pentesters in house. But the quality of the pentest then depends on personal skills. In this webinar we will show you how automated pentesting offers a solution for this.

More information

Cybersecurity news

News, articles and opinions on cybersecurity

The Hafnium lessons from the ON2IT SOC team

The clock started ticking for the sysadmins of the hundreds of thousands of Exchange servers around the world (and their risk officers or CISO’s). Exploits had been seen as early as January, so from March 2 onward the only safe assumption is that an unpatched Exchange server is a breached server.

An EY and ON2IT collaboration: Zero Trust Square Table event

Early February ON2IT CISO, prof. Yuri Bobbert was a keynote speaker at the ISACA / NOREA Square Table event about Zero Trust Readiness and Fitness. With over 300 participants and professions from organizations such as ING, Rabobank, UWV, DNB, KPMG, PwC, Volksbank, Van Lanschot, Belastingdienst and Capgemini, the webinar was a big success.

Context is key: the data challenge of cybersecurity

One of the biggest challenges within cybersecurity is how to handle the sheer amount of data. Everyone in the field is familiar with the stories of failed SIEM implementations, because the number of false positives is simply too big for the available IT staff to have enough time and manpower to separate the useful from the useless.

The broken DMZ security model

The DMZ (Demilitarized zone) model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was the same.