Persbericht 31 mei 2018

Data Migration: Guide to Success

More than 50% of data migration projects will exceed budget and/or harm the business due to flawed strategy and execution, according to Gartner. Nevertheless – data migrations are a fact of IT life.

They can be complicated and time-consuming – and regardless if you are going cross-platform, cross-domain, or adding new systems, at the end of the day you’ve got to get it right.

+ Read more
Persbericht 16 mei 2018

VMware with the NSX network

Many techniques have been tried over the years to achieve security. Some of them have been touted as the end-all, be-all of security only to be debunked years later as ineffective. 

Think, for example, about antivirus software, which was once billed as an effective datacenter security measure but is now considered largely obsolete. And the concept of protecting the network through firewalls alone is another failed concept. Once hackers get into the network, they will move laterally at will to gain access to sensitive information.

+ Read more
Persbericht 08 mei 2018

Building Digital Signatures into Document Platforms – Don’t DIY, Take It to the Cloud

Regulations like eIDASFDA CFR 21 Part 11, and US state architecture and engineering requirements are putting a spotlight on the need for trust and identity in electronic transactions. As a result, the demand for trusted, high assurance digital signatures has never been higher and companies are turning to, and expecting, their document workflow or digital transaction management providers to offer this capability directly within their existing platforms.

+ Read more
Press release 10 april 2018

IBM X-Force Report: Fewer Records Breached In 2017 As Cybercriminals Focused On Ransomware And Destructive Attacks

CAMBRIDGE, Mass., April 4, 2018 /PRNewswire/ -- IBM Security (NYSE: IBM) today announced results from the 2018 IBM X-Force Threat Intelligence Index which found the number of records breached dropped nearly 25 percent in 2017, as cybercriminals shifted their focus on launching ransomware and destructive attacks that lock or destruct data unless the victim pays a ransom.

+ Read more
Press release 10 april 2018

New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents

When a cyberattack occurs, most organizations are unprepared and do not have a consistent incident response plan. That’s the major takeaway from IBM's third annual “Cyber Resilient Organization” study, conducted by the Ponemon Institute. The study revealed that 77 percent of respondents still lack a formal cybersecurity incident response plan (CSIRP) that is applied consistently across the organization, a figure that is largely unchanged from the previous year’s study.

+ Read more
Interview 05 maart 2018

The Center for Cyber Security Belgium

The Center for Cyber Security Belgium (CCB) sees no serious threats to the cybersecurity of our country with regard to Chinese interference. About the American and British accusations against Russia, the CCB remains silent..

+ Read more
Processing more news