New name, same mission, Fox Crypto becomes Sentyron. Learn more ->

Webinar Replay: Security of Smartphones

Protect sensitive information on smartphones Smartphone security has become a critical topic as more organizations experienced incidents caused by unsafe mobile use. This webinar prepared professionals to better defend against mobile threats. Missed it? Watch the replay now and gain valuable insights from experts on how to keep mobile communications secure. Date: May 22Time: 1:00 […]

NIS2 and OT: A top-down approach to cybersecurity

NIS2 and OT: A top-down approach to cybersecurity cover

As organizations move to secure their most critical assets, Operational Technology (OT) —from industrial control systems to critical infrastructure—has come under increasing examination. Traditionally, cybersecurity focused on IT systems, leaving OT in a more isolated domain. However, the new NIS2 Directive marks a clear shift: cybersecurity is no longer limited to IT alone, and the […]

Troy Gratama: “Only using a firewall is no longer sufficient in Critical Infrastructure”

Troy Gratama: “Only using a firewall is no longer sufficient in Critical Infrastructure” cover

In critical infrastructure—where water treatment facilities, energy companies, and other essential services operate—cybersecurity is paramount. Troy Gratama, Partner Manager at Fox Crypto, witnesses daily how organizations struggle with the balance between operational continuity (OT) and modern IT requirements. Troy shares his perspective on how a DataDiode can help create a more secure and stable OT […]

Cyber recovery: the importance of the ‘last resort’ option

Cyber recovery: the importance of the ‘last resort’ option cover

Being prepared for the unexpected is not just about storing data: it is about making data available, keeping it available, and being able to recover it under all circumstances, says Ruud Veenman, Sales Executive at E-Storage. We speak to him about cyber threats, data loss and recovery, E-Storage’s solutions, DORA preparations, and cybersecurity needs beyond […]

Breaking down silos: Coordinating sensitive information security across the Dutch government

Breaking down silos: Coordinating sensitive information security across the Dutch government cover

Within the Netherlands, there’s a growing problem of sharing information and distributing who’s creating new cryptographic products. Or better said, there is a lack of ecosystems within the Dutch cryptographic landscape. Frans van Dorsselaer, Principal Architect at Fox Crypto and with over thirty years of experience in cybersecurity, has witnessed firsthand the challenges Dutch government […]

Rethinking DataDiodes: From domain separation to secure domain integration in Dutch Ministries

Rethinking DataDiodes: From domain separation to secure domain integration in Dutch Ministries cover

Contrary to common belief, DataDiodes are not merely intended for domain separation. According to Frans van Dorsselaer, Principal Architect at Fox Crypto, they are actually crucial for secure domain integration. Frans has spent years navigating the complexities of cybersecurity within Dutch government institutions. With extensive experience in developing secure communication solutions, he offers a fresh […]

Smartphone security: The unseen risks and solutions across industries

Smartphone security: The unseen risks and solutions across industries cover

Mobile security is a critical concern, and not just for organizations in the defense sector, but across all industries. As smartphones evolved into highly complex, always-connected devices, their vulnerabilities grow, leaving organizations exposed to a range of cyber threats. Jurjen Braakhekke, Product Manager at Fox Crypto, says: “We have to stop thinking of smartphones as […]

Securing smartphones: Hidden threats and tangible solutions for mobile security

Securing smartphones: Hidden threats and tangible solutions for mobile security cover

The growing reliance on smartphones for both personal and business purposes has made smartphones prime targets for cybercriminals and state-sponsored actors. Mobile devices, especially smartphones, hold large amounts of sensitive information, making them a significant vulnerability for organizations. Jurjen Braakhekke, Product Manager at Fox Crypto, says: “We have to stop thinking of smartphones as just […]

Securing tomorrow: What’s next in cybersecurity? Part II

Securing tomorrow: What’s next in cybersecurity? Part II cover

Moving from compliance to proactive security with the Secure by Design approach How do you build your products, processes, and systems? In a world where digital threats are evolving faster than ever, it is difficult to find an organization that does not understand the importance of addressing security. And if there are still organizations that […]