Gerben van der Lei: “Keep IT close to OT in order to protect the physical process”
There’s a lot to say about the OT market in combination with IT. These two markets might clash, but it’s important to keep them close together. Why? Gerben van der Lei, Principal Consultant & OT Practice Lead at Fox-IT, emphasizes: “Act now, or risk tremendous failures”. With over 12.5 years at Fox-IT and deep expertise […]
Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.”
In many industrial environments, OT teams work primarily to keep production lines running, ensuring the highest availability of systems like programmable logic controllers (PLCs) and SCADA devices. IT, on the other hand, is typically tasked with securing and optimizing office networks, data centers, and cloud solutions. While each side has different objectives and expertise, the […]
Secure Mobile: Strategies for security in high-risk environments
Cybersecurity is no longer a luxury but an absolute necessity, especially for organizations using sensitive information. One of the most underestimated risks in high-risk environments is the use of smartphones. How can we ensure that mobile devices do not become weak links in the security chain? Eddy Boot, Director of dcypher, shares his insights on […]
Webinar Replay: Security of Smartphones
Protect sensitive information on smartphones Smartphone security has become a critical topic as more organizations experienced incidents caused by unsafe mobile use. This webinar prepared professionals to better defend against mobile threats. Missed it? Watch the replay now and gain valuable insights from experts on how to keep mobile communications secure. Date: May 22Time: 1:00 […]
NIS2 and OT: A top-down approach to cybersecurity
As organizations move to secure their most critical assets, Operational Technology (OT) —from industrial control systems to critical infrastructure—has come under increasing examination. Traditionally, cybersecurity focused on IT systems, leaving OT in a more isolated domain. However, the new NIS2 Directive marks a clear shift: cybersecurity is no longer limited to IT alone, and the […]
Troy Gratama: “Only using a firewall is no longer sufficient in Critical Infrastructure”
In critical infrastructure—where water treatment facilities, energy companies, and other essential services operate—cybersecurity is paramount. Troy Gratama, Partner Manager at Fox Crypto, witnesses daily how organizations struggle with the balance between operational continuity (OT) and modern IT requirements. Troy shares his perspective on how a DataDiode can help create a more secure and stable OT […]
Cyber recovery: the importance of the ‘last resort’ option
Being prepared for the unexpected is not just about storing data: it is about making data available, keeping it available, and being able to recover it under all circumstances, says Ruud Veenman, Sales Executive at E-Storage. We speak to him about cyber threats, data loss and recovery, E-Storage’s solutions, DORA preparations, and cybersecurity needs beyond […]
Managing different types of mobile devices as one fleet: challenges and how to overcome them
Within any organization, it is critical that every mobile device in use is also properly secured. But when numerous different types of devices are in use within an organization, managing them can be complex. In such a situation, how do you ensure that you maintain control over devices in circulation, who is using them and […]
Breaking down silos: Coordinating sensitive information security across the Dutch government
Within the Netherlands, there’s a growing problem of sharing information and distributing who’s creating new cryptographic products. Or better said, there is a lack of ecosystems within the Dutch cryptographic landscape. Frans van Dorsselaer, Principal Architect at Fox Crypto and with over thirty years of experience in cybersecurity, has witnessed firsthand the challenges Dutch government […]
Rethinking DataDiodes: From domain separation to secure domain integration in Dutch Ministries
Contrary to common belief, DataDiodes are not merely intended for domain separation. According to Frans van Dorsselaer, Principal Architect at Fox Crypto, they are actually crucial for secure domain integration. Frans has spent years navigating the complexities of cybersecurity within Dutch government institutions. With extensive experience in developing secure communication solutions, he offers a fresh […]