Vulnerabilities: Understand, mitigate, remediate

Vulnerabilities: Understand, mitigate, remediate

As the value of data has grown managing vulnerabilities effectively is essential for the success of your organizations’ security and minimizing the impact of successful attacks. But: What are those vulnerabilities, anyway? Eddy Willems explains. As the value of data...
Ransomware and How to Stop It

Ransomware and How to Stop It

The ransomware plague seems to be unstoppable. Everyone is suffering – businesses, healthcare, utilities, and governments. It’s about making money, and the perpetrators don’t seem to care who gets hurt in the process. But why hasn’t the cybersecurity industry fixed...
How Best to Secure Applications in Any Cloud

How Best to Secure Applications in Any Cloud

Organizations worldwide are digitizing their products, services, and operations and moving applications to the cloud as quickly as possible. This forced—though often not well-planned— acceleration to the cloud is happening for several reasons, both internally and...
Cloud migration: Contribution to a sustainable IT

Cloud migration: Contribution to a sustainable IT

The use of cloud services is flourishing and has become the driving force in digital transformation. But is this growth sustainable? And is the cloud climate-friendly? A look on how companies can reduce their carbon footprint by building better cloud infrastructures....