The Schrems II decision: a milestone for privacy?
The CJEU’s decision on Schrems II declared Privacy Shield invalid. The implications cannot be foreseen, but it is clearly a win for data privacy. Read what experts say on the ruling.
Read moreThe CJEU’s decision on Schrems II declared Privacy Shield invalid. The implications cannot be foreseen, but it is clearly a win for data privacy. Read what experts say on the ruling.
Read moreCryptography is the last line of defense – and quantum computers will break that defense. Read what software company SAP will do to prevent this from happening.
Read moreIn the second episode of our editorial podcast on 5G security, we elaborate on the need of virtualization for 5G. On one hand, being software-based, virtualization makes 5G networks more vulnerable, while also vritualization opens up more possibilities for securing mobile networks.
Read moreRogue devices, which are intentionally compromised to carry out cyberattacks, become an increasingly popular mean among cybercriminals. Read what to do about them here.
Read moreIn the sixth episode of our OSINT series, Dr. Varin Khera explores the Dark Web – the hidden internet – using the TOR service. Do try this at home!
Read moreWhen selecting security solutions, it’s important to have a plan to follow Having an architecture will help you integrate the various solutions into a stronger overall defense.
Read moreInsecure devices from the home networks might infect the corporate infastructure when we return to the office. We’ve had the chance to talk to Matthias Canisius about what strategies are best to securely go back to work.
Read moreAs we hit the 2 year anniversary of GDRPR, Covid-19 has forced organizations to revise their processes in light of increased remote work. Some considerations for a remote work policy under GDPR.
Read moreThese days, everybody talks about Covid-19 and cyberattacks. But how do biological and computer viruses compare? Read all about it here
Read moreSee our discussion with Eddy Willems, renowned security specialist and book author, about todays security landscape and how to protect yourself in it.
Read more