NCC Group completes the sale of Fox Crypto 

Fox IT’s parent company, NCC Group, a people-powered, tech-enabled global cyber and resilience business, has completed the sale of Fox Crypto to CR Group Nordic AB, following the initial announcement on 1 August 2024.   Fox Crypto develops and maintains high assurance cryptographic products to secure and contain sensitive information.   Behind the decision is a strategy […]

Fox Crypto’s DataDiode Partner Event 2025: Innovating and growing together in Rotterdam

Fox Crypto’s DataDiode Partner Event 2025: Innovating and growing together in Rotterdam cover

Fox Crypto’s annual DataDiode Partner Event took place in the innovative city of Rotterdam this year, continuing its tradition of bringing together experts in a relaxed and intimate setting. The event was a perfect combination of networking, technical insights, valuable partner presentations, and a forward-looking vision. A recap of the Partner Event 2025 On Thursday, […]

Our mobile communication security strategy is outdated

We need to stop reacting to events and start rethinking how we build our systems. This is the overarching message from Martijn Neef, Coordinator of Knowledge and Innovation Cybersecurity at the Dutch Ministry of Economic Affairs. According to Martijn, the current approach of constantly patching and fixing vulnerabilities is no longer sustainable. This is especially […]

Webinar replay: Secure IT/OT Integration in Critical Infrastructure

Are you prepared for the security challenges of OT environments? Missed it? Watch the replay now and gain valuable insights from experts on how to keep mobile communications secure. For whom? This webinar is designed for specialists and managers involved in — or supporting — critical infrastructure environments, including both system integrators and end-user organizations with a focus on IT and OT […]

Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.”

Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.” cover

In many industrial environments, OT teams work primarily to keep production lines running, ensuring the highest availability of systems like programmable logic controllers (PLCs) and SCADA devices. IT, on the other hand, is typically tasked with securing and optimizing office networks, data centers, and cloud solutions. While each side has different objectives and expertise, the […]

Secure Mobile: Strategies for security in high-risk environments

eddy boot expert interview dcypher

Cybersecurity is no longer a luxury but an absolute necessity, especially for organizations using sensitive information. One of the most underestimated risks in high-risk environments is the use of smartphones. How can we ensure that mobile devices do not become weak links in the security chain? Eddy Boot, Director of dcypher, shares his insights on […]

Webinar Replay: Security of Smartphones

Protect sensitive information on smartphones Smartphone security has become a critical topic as more organizations experienced incidents caused by unsafe mobile use. This webinar prepared professionals to better defend against mobile threats. Missed it? Watch the replay now and gain valuable insights from experts on how to keep mobile communications secure. Date: May 22Time: 1:00 […]

NIS2 and OT: A top-down approach to cybersecurity

NIS2 and OT: A top-down approach to cybersecurity cover

As organizations move to secure their most critical assets, Operational Technology (OT) —from industrial control systems to critical infrastructure—has come under increasing examination. Traditionally, cybersecurity focused on IT systems, leaving OT in a more isolated domain. However, the new NIS2 Directive marks a clear shift: cybersecurity is no longer limited to IT alone, and the […]

Troy Gratama: “Only using a firewall is no longer sufficient in Critical Infrastructure”

Troy Gratama: “Only using a firewall is no longer sufficient in Critical Infrastructure” cover

In critical infrastructure—where water treatment facilities, energy companies, and other essential services operate—cybersecurity is paramount. Troy Gratama, Partner Manager at Fox Crypto, witnesses daily how organizations struggle with the balance between operational continuity (OT) and modern IT requirements. Troy shares his perspective on how a DataDiode can help create a more secure and stable OT […]