New name, same mission, Fox Crypto becomes Sentyron. Learn more ->

The hidden world of smartphone security: what your device isn’t telling you

Your smartphone knows more about you than you might realize—possibly even more than your own memory. It feels safe, familiar, almost like an extension of yourself. But is it really secure? As technology advances at breakneck speed, so do the threats that come with it. Cybercriminals are constantly finding new ways to access highly personal […]

Eliminating the weakest link: Managing supply chain cybersecurity risk through components

By Ellen Wesselingh Summary This article describes a follow-up activity for the analysis described in Eliminating the weakest link – Managing Supply Chain Cybersecurity Risk through Life Cycle Modelling (IB Magazine 2024#4): the analysis of security-critical components, and follow-up action. Not all components in a system are security critical, so measures in the supply chain […]

NCC Group completes the sale of Fox Crypto 

Fox IT’s parent company, NCC Group, a people-powered, tech-enabled global cyber and resilience business, has completed the sale of Fox Crypto to CR Group Nordic AB, following the initial announcement on 1 August 2024.   Fox Crypto develops and maintains high assurance cryptographic products to secure and contain sensitive information.   Behind the decision is a strategy […]

Fox Crypto’s DataDiode Partner Event 2025: Innovating and growing together in Rotterdam

Fox Crypto’s DataDiode Partner Event 2025: Innovating and growing together in Rotterdam cover

Fox Crypto’s annual DataDiode Partner Event took place in the innovative city of Rotterdam this year, continuing its tradition of bringing together experts in a relaxed and intimate setting. The event was a perfect combination of networking, technical insights, valuable partner presentations, and a forward-looking vision. A recap of the Partner Event 2025 On Thursday, […]

Our mobile communication security strategy is outdated

We need to stop reacting to events and start rethinking how we build our systems. This is the overarching message from Martijn Neef, Coordinator of Knowledge and Innovation Cybersecurity at the Dutch Ministry of Economic Affairs. According to Martijn, the current approach of constantly patching and fixing vulnerabilities is no longer sustainable. This is especially […]

Webinar replay: Secure IT/OT Integration in Critical Infrastructure

Are you prepared for the security challenges of OT environments? Missed it? Watch the replay now and gain valuable insights from experts on how to keep mobile communications secure. For whom? This webinar is designed for specialists and managers involved in — or supporting — critical infrastructure environments, including both system integrators and end-user organizations with a focus on IT and OT […]

Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.”

Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.” cover

In many industrial environments, OT teams work primarily to keep production lines running, ensuring the highest availability of systems like programmable logic controllers (PLCs) and SCADA devices. IT, on the other hand, is typically tasked with securing and optimizing office networks, data centers, and cloud solutions. While each side has different objectives and expertise, the […]

Secure Mobile: Strategies for security in high-risk environments

eddy boot expert interview dcypher

Cybersecurity is no longer a luxury but an absolute necessity, especially for organizations using sensitive information. One of the most underestimated risks in high-risk environments is the use of smartphones. How can we ensure that mobile devices do not become weak links in the security chain? Eddy Boot, Director of dcypher, shares his insights on […]