The number of successful cyberattacks taking over the cloud accounts of top executives has increased by more than 100 percent. Cybercriminals are using a phishing tool – EvilProxy – based on a reverse...
Security teams make four "impossible" trade-offs when fending off threats. They must decide which attacks to prioritize; choose which vulnerabilities to fix; optimize prevention or detection controls, and...
The Cabinet has decided to merge the existing cybersecurity organizations of the central government. The National Cyber Security Center (NCSC) of the Ministry of JenV, the Digital Trust Center (DTC), and...
Cyber threats can occur at Dutch Railways (Nederlandse Spoorwegen or NS) in various places: trains, stations, workplaces, data centers, websites, mobile apps, and the chain. According to CISO Dimitri van...
Gunther Cleijn is Global CISO at NewCold, a company specializing in building and managing cold storage facilities worldwide. Like so many CISOs, he faces a severe shortage of security specialists. His...
Eneco, part of the vital infrastructure since June this year, takes cybersecurity very seriously. The next few years will, therefore, be marked by the adoption of zero-trust practices and architecture. We...