Gefken Cases and Fox Crypto collaborate to develop a waterproof case for the Dutch Defense
Fox Crypto, as a strategic partner, develops products for the Dutch Defense. To safely transport one of these products along with all necessary accessories, there was a need for a waterproof plastic case that would perfectly accommodate the device. Gefken Cases and Fox Crypto joined forces and came up with the ideal solution: a Sentinel […]
The hidden world of smartphone security: what your device isn’t telling you
Your smartphone knows more about you than you might realize—possibly even more than your own memory. It feels safe, familiar, almost like an extension of yourself. But is it really secure? As technology advances at breakneck speed, so do the threats that come with it. Cybercriminals are constantly finding new ways to access highly personal […]
Eliminating the weakest link: Managing supply chain cybersecurity risk through components
By Ellen Wesselingh Summary This article describes a follow-up activity for the analysis described in Eliminating the weakest link – Managing Supply Chain Cybersecurity Risk through Life Cycle Modelling (IB Magazine 2024#4): the analysis of security-critical components, and follow-up action. Not all components in a system are security critical, so measures in the supply chain […]
NCC Group completes the sale of Fox Crypto
Fox IT’s parent company, NCC Group, a people-powered, tech-enabled global cyber and resilience business, has completed the sale of Fox Crypto to CR Group Nordic AB, following the initial announcement on 1 August 2024. Fox Crypto develops and maintains high assurance cryptographic products to secure and contain sensitive information. Behind the decision is a strategy […]
Fox Crypto’s DataDiode Partner Event 2025: Innovating and growing together in Rotterdam
Fox Crypto’s annual DataDiode Partner Event took place in the innovative city of Rotterdam this year, continuing its tradition of bringing together experts in a relaxed and intimate setting. The event was a perfect combination of networking, technical insights, valuable partner presentations, and a forward-looking vision. A recap of the Partner Event 2025 On Thursday, […]
Our mobile communication security strategy is outdated
We need to stop reacting to events and start rethinking how we build our systems. This is the overarching message from Martijn Neef, Coordinator of Knowledge and Innovation Cybersecurity at the Dutch Ministry of Economic Affairs. According to Martijn, the current approach of constantly patching and fixing vulnerabilities is no longer sustainable. This is especially […]
Webinar replay: Secure IT/OT Integration in Critical Infrastructure
Are you prepared for the security challenges of OT environments? Missed it? Watch the replay now and gain valuable insights from experts on how to keep mobile communications secure. For whom? This webinar is designed for specialists and managers involved in — or supporting — critical infrastructure environments, including both system integrators and end-user organizations with a focus on IT and OT […]
Gerben van der Lei: “Keep IT close to OT in order to protect the physical process”
There’s a lot to say about the OT market in combination with IT. These two markets might clash, but it’s important to keep them close together. Why? Gerben van der Lei, Principal Consultant & OT Practice Lead at Fox-IT, emphasizes: “Act now, or risk tremendous failures”. With over 12.5 years at Fox-IT and deep expertise […]
Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.”
In many industrial environments, OT teams work primarily to keep production lines running, ensuring the highest availability of systems like programmable logic controllers (PLCs) and SCADA devices. IT, on the other hand, is typically tasked with securing and optimizing office networks, data centers, and cloud solutions. While each side has different objectives and expertise, the […]
Secure Mobile: Strategies for security in high-risk environments
Cybersecurity is no longer a luxury but an absolute necessity, especially for organizations using sensitive information. One of the most underestimated risks in high-risk environments is the use of smartphones. How can we ensure that mobile devices do not become weak links in the security chain? Eddy Boot, Director of dcypher, shares his insights on […]