
The increased need to comply with regulations causes a loss of focus on underlying risks – which can ultimately jeopardize a company's continuity.


In 2025, I hope The Netherlands fully embraces the fourth industrial revolution – with a fundamental shift in mindset. Cybersecurity must no longer be treated as an afterthought.


One of the alarming trends is the incorrect use of IT resources by employees, or misuse, according to Orange Cyberdefense’s Security Navigator report.


The Dutch government has engaged in talks with U.S. chip firms Nvidia and AMD about the development of an AI facility, it said in a statement last week which has been taken down since.


According to researchers, cybercriminals have engineered a simple but sophisticated scheme to circumvent facial identity verification systems through coordinated data collection on the dark web.


The best way to safeguard cryptographic keys — and ultimately protect critical data — is with hardware security modules (HSMs) specifically designed to safeguard and manage them.


Earlier this month, it was found that Chinese hackers breached dozens of telcos worldwide. They specifically targeted at least eight US telecommunications and telecom infrastructure companies.


Pro-Russian hacktivists have claimed over 6,600 attacks since March 2022, almost exclusively targeting Europe. This is the most important outcome of the latest Orange Cyberdefense Security research.


Digitalization State Secretary Zsolt Szabó has temporarily halted a planned cloud migration of data by governmental services and organizations, the Volkskrant reported on Monday.


Russian cybersecurity company Kaspersky has outlined its predictions for the 2025 advanced persistent threat landscape.
