Secure your seat for our upcoming NIS2 and segmentation webinar here

News

Breaking down silos: Coordinating sensitive information security across the Dutch government cover

Breaking down silos: Coordinating sensitive information security across the Dutch government

Within the Netherlands, there’s a growing problem of sharing information and distributing who’s creating new cryptographic products. Or better said, there is a lack of ecosystems within the Dutch cryptographic landscape. Frans van Dorsselaer,...

Rethinking DataDiodes: From domain separation to secure domain integration in Dutch Ministries cover

Rethinking DataDiodes: From domain separation to secure domain integration in Dutch Ministries

Contrary to common belief, DataDiodes are not merely intended for domain separation. According to Frans van Dorsselaer, Principal Architect at Fox Crypto, they are actually crucial for secure domain integration. Frans has spent years...

Smartphone security: The unseen risks and solutions across industries cover

Smartphone security: The unseen risks and solutions across industries

Mobile security is a critical concern, and not just for organizations in the defense sector, but across all industries. As smartphones evolved into highly complex, always-connected devices, their vulnerabilities grow, leaving organizations exposed to...

Securing smartphones: Hidden threats and tangible solutions for mobile security cover

Securing smartphones: Hidden threats and tangible solutions for mobile security

The growing reliance on smartphones for both personal and business purposes has made smartphones prime targets for cybercriminals and state-sponsored actors. Mobile devices, especially smartphones, hold large amounts of sensitive information, making them a...

Securing tomorrow: What’s next in cybersecurity? Part II cover

Securing tomorrow: What’s next in cybersecurity? Part II

Moving from compliance to proactive security with the Secure by Design approach How do you build your products, processes, and systems? In a world where digital threats are evolving faster than ever, it is...

Securing tomorrow: What’s next in cybersecurity? cover

Securing tomorrow: What’s next in cybersecurity? Part I

Navigating AI implementation in classified environments As organizations rush to embrace AI technologies, the challenge of implementing these tools in classified or confidential environments becomes increasingly complex. While the potential benefits are significant, organizations...