Securing tomorrow: What’s next in cybersecurity? Part I
Navigating AI implementation in classified environments As organizations rush to embrace AI technologies, the challenge of implementing these tools in classified or confidential environments becomes increasingly complex. While the potential benefits are significant, organizations must carefully consider how to leverage AI capabilities without compromising sensitive, confidential or classified information. In this article, we discuss the […]
Protecting critical government data: Lessons learned from the Italian data breach
The breach and its implications In a high-profile case, prosecutors in Milan uncovered a criminal network that had illegally accessed over 800,000 confidential records from various Italian government databases, including sensitive information from the Interior Ministry and the President's office. Maurizio Corti, CEO of Heimdall Consulting, describes, "The group is alleged to have infiltrated government […]
Daniël Datau: “There’s no such thing as too much security when it comes to smartphones, especially when sensitive or classified information is at risk.”
As mobile devices become increasingly integral to our daily work and personal lives, the security challenges they present are more critical than ever. Daniël Datau, Senior Business Development Manager at Fox Crypto, specializing in government and defense, shares his insights on the growing need for robust mobile security solutions. In this article, we discuss the […]
First reactions to the Fox Crypto DataDiode Andean 1G
Fox Crypto is excited to share the first feedback from the market, regarding the new DataDiode Andean 1G. Launched in October, this innovative solution has already made a positive impression, particularly for customer cases requiring mobility or space-saving solutions in data centers. 1 unit rackspace The DataDiode Andean 1G offers significant advantages in compactness. This […]
“Listen to each other and reinforce each other” – Rob Verseijden on the integration of OT and IT security
In the world of OT, cybersecurity is often seen as an incidental/secondary concern. However, the risks are significant for companies that fail to adapt to the growing external threats. Rob Verseijden, OT and ICS Cybersecurity Specialist at Batenburg Techniek, offers a clear perspective on the integration of OT and IT security and the importance of […]
Understanding NIS2 and segmentation: Expert webinar recording now available
Did you miss our recent webinar on the NIS2 Directive and network segmentation? On November 7th, we brought together leading industry experts to decode the complexities of NIS2 and explore its practical implementation through network segmentation. In this session, Member of European Parliament Bart Groothuis provides valuable insights into the directive's impact on organizations. Our […]
From afterthought to core part of product development: cybersecurity & the CRA
With cyber threats arising from all angles, we all understand the importance of good cybersecurity. But how do we ensure that the products that we buy are safe – and remain safe? This is where the Cyber Resilience Act comes in. Soon, this new EU regulation will force companies to no longer consider cybersecurity as […]
Making secure collaboration possible with the Nexor GuarDiode File Edition 4
When working with sensitive data, organizations need more than just advanced technology: they need the confidence that they can share sensitive information across networks with that technology. The Nexor GuarDiode File Edition 4 brings that peace of mind. By combining an unidirectional data flow with advanced data cleansing software, organizations remain in control of their […]
Getting to the core of cybersecurity with NIS2
Approaching new cybersecurity laws merely as compliance tasks falls short of creating an effective cybersecurity strategy, says Hendrik Schimmelpenninck van der Oije, executive consultant at Fox-IT. By focusing on the intent behind these regulations and understanding the reasons for their specific requirements, you can get to the core of what cybersecurity is. Hendrik will speak […]
Eliminating the weakest link: Managing supply chain cybersecurity risk through life cycle
By Ellen Wesselingh Summary In recent years, supply chain issues for products with digital elements have increased, which poses a problem for the assurance of the Integrity of these products and the Confidentiality of the data contained in these products. To illustrate the problem, this article provides a number of examples of supply chain attacks […]