
The increased need to comply with regulations causes a loss of focus on underlying risks – which can ultimately jeopardize a company's continuity.


Chief Information Security Officers are gaining more influence within the C-suite and boardrooms.


In 2025, I hope The Netherlands fully embraces the fourth industrial revolution – with a fundamental shift in mindset. Cybersecurity must no longer be treated as an afterthought.


One of the alarming trends is the incorrect use of IT resources by employees, or misuse, according to Orange Cyberdefense’s Security Navigator report.


The Dutch government has engaged in talks with U.S. chip firms Nvidia and AMD about the development of an AI facility, it said in a statement last week which has been taken down since.


With the start of Trump’s second term, we can expect significant shifts in cybersecurity policies and broader tech-related issues.


Observability is transforming from a reactive to a proactive practice. What’s next in 2025? These are the five observability predictions according to Splunk.


According to researchers, cybercriminals have engineered a simple but sophisticated scheme to circumvent facial identity verification systems through coordinated data collection on the dark web.


The best way to safeguard cryptographic keys — and ultimately protect critical data — is with hardware security modules (HSMs) specifically designed to safeguard and manage them.


Earlier this month, it was found that Chinese hackers breached dozens of telcos worldwide. They specifically targeted at least eight US telecommunications and telecom infrastructure companies.
