Eliminating the weakest link: Managing supply chain cybersecurity risk through life cycle
By Ellen Wesselingh Summary In recent years, supply chain issues for products with digital elements have increased, which poses a problem for the assurance of the Integrity of these products and the Confidentiality of the data contained in these products. To illustrate the problem, this article provides a number of examples of supply chain attacks […]
Strengthening ecosystems in the Dutch cryptography landscape
On September 26, Fox Crypto held a successful relationship day at the elegant Louwman Museum in The Hague. This event brought together stakeholders from the Dutch crypto industry to discuss collaboration within various ecosystems, a crucial topic in the landscape of cryptography. The importance of ecosystems The central theme of the day revolved around the […]
Enhance your OT security with Splunk
Did you know DataDiodes offer a vital layer of protection and enhanced usability that goes beyond traditional air gapping and firewalls? This is especially crucial in industries like manufacturing, power generation, and other OT environments, which are central to your business functions and revenue generation. Despite their importance, organizations often struggle with limited visibility into […]
How DataDiodes strengthen your critical assets and comply with NIS2
The NIS2 directive offers vital guidance for organizations aiming to secure their networks. This legislation will equip critical and highly critical sectors with enhanced tools to improve their security, strengthen their defenses, and refine their response strategies, all aimed at stopping potential attackers. Marck van Haren, Sales Engineer at Fox Crypto and an expert in […]
The importance of ecosystems in the Dutch cryptography landscape
Due to geopolitical developments and the importance of digital strategic autonomy, there is a growing recognition that the Dutch cryptography landscape is a crucial value chain that needs support and improvement. Daniël Datau is Senior Business Development Manager at Fox Crypto, specializing in government and defense. His role involves strategic alignment of organizational goals to […]
Preparing for NIS2 across the EU: development, delays, & decisions
Dutch companies run the risk of losing international clients through NIS2 regulations, the Dutch digital security platform Samen Digitaal Veilig warned earlier this year. Companies such as Germany and Belgium are on track of meeting the NIS2 deadline of October 17 this year. The Dutch government, however, is lagging behind in implementing the NIS2 regulation […]
Are you ready for NIS2? Network segmentation explained
Critical sectors are an important target for cybercriminals. Whether an organization deals with water management, digital infrastructure, transport or vital infrastructure such as ports and railways, adversaries are always looking for a way in. The new NIS2 legislation will provide critical and highly critical sectors more tools to improve their security, improve their defenses, and […]
NCC Group announces sale of Fox Crypto
Fox IT’s parent company announces the sale of specialised business that develops and maintains high assurance cryptographic products to secure and contain sensitive information. Fox IT’s cyber security services business is unaffected by the sale. Today, NCC Group, Fox IT’s parent company, announced the sale of Fox Crypto, a business that develops and maintains high […]
NIS2 and segmentation: everything you need to know
Join us for an insightful session on the new NIS2 Directive and the crucial role of segmentation with industry experts.
Christo Butcher on NIS2: ‘Cybersecurity is not just an IT issue anymore’
Implementing regulatory frameworks like NIS2 is crucial for organizations to safeguard their digital assets. Let’s take a look at the practical challenges and strategic shifts required for effective cybersecurity management, highlighting the importance of top-down responsibility. Christo Butcher, an executive consultant at Fox Crypto, offers an enlightening perspective on the complexities of the NIS2 directive. […]