Our Voice
NIS2: Changes to Data Compliance
Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.
Our Voice
Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.
Edit this archive in archive.php
Technology Talks
Hear some actionable insights from cyber security expert and former cyber awareness trainer, Nick Oosterwijk in our latest Technology Talk. Gain tips and best practices aimed at increasing overall cyber security posture, both personally and professionally!
Technology Talks
Listen to our Dutch Country Lead, Thierry Lammers discuss with Data & Compliance Specialist Bastiaan the background and functions of the Software Bill of Materials and that NIS2 requires you to have a responsibility for your enterprise architecture.
Our Voice
The average company’s data footprint keeps growing exponentially. Imagine this: people create 2.5 quintillion bytes of data and send 333.2 billion emails every single day.
Our Voice
Used correctly, an XDR solution can unite multiple isolate security tools and reduce the complexity that hinders fast detection and response. Here are five key best practices that make a strong case for adopting XDR.
White Paper
To help IT teams combat the challenges of today’s modern workplace, Samsung designed Knox Suite, an all-in-one solution for enterprise mobility and security. Download our 'An Introduction to Knox Suite' Whitepaper today to find out more.
Our Voice
Here is a quick guide to some of the widely used cyber security acronyms used for security operation centres.
Our Voice
As the world becomes more connected and digital, cybersecurity is becoming more complicated. Here are six cyber security trends you need to know to prevent compromise.