The Dutch
Security Cluster
 
 
The Dutch
Security Cluster

External HSD Partner Blogs

Within the HSD network technological developments, societal issues, and knowledge focusing on security and innovation is being shared continuously. Get your access to knowledge and see how other organisations in the HSD Community look at challenges in the security domain! Need tips or a different view for your security challenge? Check the latest blogs and articles from partners in the HSD community!

 

 

Simple and SUCCESSFUL Solution Against DDoS Attacks. I’ve tested and attested.

Simple and SUCCESSFUL Solution Against DDoS Attacks. I’ve tested and attested.

28 October 2019 | Jair Santanna
dcypher
The “hidden window isolation” analogy. Imagine you have a house with one big door, several guards and one hidden window....
Quantum Supremacy: Zijn uw wachtwoorden nog veilig?

Quantum Supremacy: Zijn uw wachtwoorden nog veilig?

28 October 2019 | Peter Zinn
Het gerucht ging al een tijdje, maar vorige week werd het door Google bevestigd. De Google quantum computer heeft quantum...
What is an Insider Threat?

What is an Insider Threat?

25 October 2019 | Community Manager
APVERA BV
Insider threats are security risks originating from within an organization due to the negligence or malicious intent of current...
Bedrijfsgeheimen Zweven Versnipperd in de Cloud

Bedrijfsgeheimen Zweven Versnipperd in de Cloud

21 October 2019 | Stijn van Gils
Penetra Cyber Security B.V (Biznet)
Bedrijfscijfers, personeelsgegevens, klantenbestanden. Bedrijven verhuizen hun data naar de cloud. Maar daarmee zijn ze wel...
Ongelooflijke Oliebol

Ongelooflijke Oliebol

17 October 2019 | Jan Martijn Broekhof
Guardian360
Het zal je maar gezegd worden! Volgens onze Minister van Justitie ben je een ‘ongelofelijke oliebol’ als je noodzakelijke...
The Ransomware Evolution Landscape Part 2 - GandCrab, Sodinokibi and How to Scam a RaaS Operator

The Ransomware Evolution Landscape Part 2 - GandCrab, Sodinokibi and How to Scam a RaaS Operator

15 October 2019 | Ippolito Forni
EclecticIQ
In part one of our ‘Evolution of the Ransomware Landscape’ blog series we examined how ransomware grew quickly into the biggest...
All it Takes is one Human Error to Compromise Your Organisation's Reputation

All it Takes is one Human Error to Compromise Your Organisation's Reputation

14 October 2019 | HSD Foundation
ZIVVER
Professionals understand the value of their companies' reputation. Firms with a powerful and positive reputation attract better...
Shielding Every Naval Vessel From Cyberattacks

Shielding Every Naval Vessel From Cyberattacks

03 October 2019 | HSD Foundation
Thales Nederland
A new battlefield has emerged in recent years with no clear front lines and no killed or wounded combatants. However this new...
Wat is Beter: Geen Beveiliging of Slechte Beveiliging?

Wat is Beter: Geen Beveiliging of Slechte Beveiliging?

30 September 2019 | Peter Zinn
De afgelopen tijd zijn er een aantal kwetsbaarheden in VPN systemen aan het licht gekomen. VPN (voor Virtual Private Network)...
Cyber 2.0: Analytics Still More Important Than AI

Cyber 2.0: Analytics Still More Important Than AI

28 September 2019 | Ulrich Mans
EclecticIQ
Dutch cyber companies have long attended the RSA Conference in San Francisco , which is one of the world’s largest cyber...
 

Search Blogs

clear search

Filter search

Partner