In this second chapter of our three-part series we will look further into the mind of an application pentester to find out about challenges.
In the first chapter of a three-part series we will delve into the mind of an application pentester.
Rethinking “Zero Trust” in Cybersecurity: Why Trust Still Matters In the realm of cybersecurity, the term “Zero Trust” has gained considerable traction in recent years. It suggests a paradigm...
What OT security is all about OT security this, OT security that… a lot of technology vendors are hitting this nail and promising all sorts of things. But they...
What do data diodes and “Zone 30” have in common? What is a data diode? A data diode, also sometimes called one-way or unidirectional technology, is a powerful security...
This NIS2 Directive: what is that? Is that something for me? I receive a lot of questions from customers and prospects about the NIS2 Directive. That’s why I decided...
Are Passwords a Thing of the Future? Or a Thing of the Past? Passwords have been used for a very long time. Nowadays we use them in our digital...
Evaluate and enhance your SME’s cybersecurity ENISA, the European Union Agency for Cybersecurity does a tremendous effort to increase the cybersecurity and cyber resilience in the European Union. One...
PLC security: keep it in running mode. Systems in the factory, such as PLCs, are being connected to the network more often. This opens new opportunities for data visualisation,...
Spinae successfully guides customer to ISO 27001 certification Recently we successfully completed a guidance process in which Spinae, together with the customer, developed and implemented an Information Security Management...