The Dutch
Security Cluster
 
 
The Dutch
Security Cluster

External HSD Partner Blogs

Within the HSD network technological developments, societal issues, and knowledge focusing on security and innovation is being shared continuously. Get your access to knowledge and see how other organisations in the HSD Community look at challenges in the security domain! Need tips or a different view for your security challenge? Check the latest blogs and articles from partners in the HSD community!

 

 

Cyber Als Mindf*ck

Cyber Als Mindf*ck

10 November 2020 | Stefan Zwager & Zico van Rooijen
AIG Europe, Netherlands
Ooit in een Mindf*ck illusie van Victor Mids en Oscar Verpoort getrapt? Dit is je niet te verwijten. Hun experimenten zijn...
Owning Up Digital Security in The Municipality of The Hague

Owning Up Digital Security in The Municipality of The Hague

06 November 2020 | Peter Van Eijk
City of The Hague
For a municipality, core services for citizens and businesses rely heavily on IT. And the COVID-19 crisis adds remote working to...
How to govern the 1.5 meter society?

How to govern the 1.5 meter society?

29 October 2020 | PublicSonar
PublicSonar
To control the spread of the coronavirus the Dutch government introduced partial lockdown measures since 13th October. For...
Het Menselijke Immuunsysteem: Wapen in de Strijd Tegen Cyberaanvallen

Het Menselijke Immuunsysteem: Wapen in de Strijd Tegen Cyberaanvallen

29 October 2020 | TNO
TNO
Kunnen we cybersecurity verbeteren door te leren van de verdediging van het menselijk lichaam tegen aanvallen van virussen en...
 Alien - The Story of Cerberus' Demise

Alien - The Story of Cerberus' Demise

24 September 2020 | Threatfabric
ThreatFabric
As predicted in our blog 2020 – year of the RAT, 2020 has been an effervescent year for financially motivated threat actors...
Puntsgewijs | Voorkom innovatievondelingen

Puntsgewijs | Voorkom innovatievondelingen

22 September 2020 | Gerard Kuijlaars
Nationale Politie
In living labs, proeftuinen en andere experimenteeromgevingen werkt de politie samen met publieke en private partners aan...
Secure Your IoT Edge Compute Today With Enclaves

Secure Your IoT Edge Compute Today With Enclaves

21 September 2020 | Eustacea
Scalys B.V.
Today we are excited to announce the general availability of Azure IoT Edge security with enclaves to help protect sensitive...
Solving IoT Device Security at Scale Through Standards

Solving IoT Device Security at Scale Through Standards

21 September 2020 | Eustacea
Scalys B.V.
Companies building Internet of Things (IoT) solutions today are likely to deploy IoT applications that use unsecured devices,...
5 Tips voor CISO’S

5 Tips voor CISO’S

18 September 2020 | Judith Veenhouwer
SentinelOne
Als CISO is het lastig is om de juiste cybersecuritytalenten te vinden – én die uitdaging wordt alleen maar groter. Natuurlijk...
Do Energy Consumption, Privacy and Quantum Computing Pose a Threat to Blockchain Initiatives?

Do Energy Consumption, Privacy and Quantum Computing Pose a Threat to Blockchain Initiatives?

11 September 2020 | Tim Janssen
Visma Connect BV
In the previous articles of this series, we discussed the most important challenges blockchain must overcome to become mainstream.

Search Blogs

clear search

Filter search

Partner