06 / 10 / 21
Endpoint Security in the New Normal
Cegeka
06 / 10 / 21
Cegeka
06 / 10 / 21
Cegeka
20 / 05 / 21
Cybercrime is omnipresent these days. The ubiquitous online threats require you to ensure your users stay on their toes about cyber security, in order to protect your environment. This means that raising awareness is a constant...
25 / 05 / 21
Cameras can do much more than just capture video. They have proven useful in monitoring traffic or providing data to make our cities smarter and safer. But privacy is just as important. It isn’t always clear...
19 / 05 / 21
Following our last ‘Beltug challenges Microsoft’, in October 2020, several additional topics came up during discussions at other Beltug activities. So Beltug gave our members (users only!) another opportunity to meet with Microsoft.
29 / 04 / 21
All too often, companies can end up ‘running behind the facts’ in the IT security arena. You need a solid security strategy to stay ahead, while governance is critical to keep in control.
25 / 03 / 21
When building the security for your IT environment and working out your security strategy, you have to look beyond your own perspective and needs. There are also plenty of elements to incorporate and rules to comply...
25 / 02 / 21
The devil is often in the details – including for your organisation’s 360° security approach. Who uses your IT environment (including your cloud) and which access rights do you grant to whom? And since it isn’t...
10 / 12 / 20
At the moment of a cyber threat, it is too late to think of what to do: you need to know what to do. Cyber attacks continue to not only increase, but to get more innovative,...
08 / 10 / 20
The best security system in the world won’t protect your infrastructure, data and assets if the people inside your organisation don’t ‘keep the doors locked’. On the other side, however, security limits what staff and users...