Security

Why tell customers about their personal data? Just because GDPR says so?

Transparency is one of the key parts of the European Union’s General Data Protection Regulation (GDPR) with which companies must comply by May 25, 2018. Personally I find this very surprising. I’m not talking about the fact that under this new legislation, individuals gain the right to know what personal data an organization has collected […]

Continue reading

Tijd om de beveiliging van onze smartphones waterdicht te maken

Door Eric Bos, Security Consultant Enterprise Mobility bij IBM |  De helft van de Belgen heeft een smartphone. Wereldwijd zullen er tegen 2020 volgens Forrester Research meer dan 5,4 miljard actieve toestellen in gebruik zijn. De laatste jaren is mobiele malware één van de voornaamste kopzorgen geworden van CIO’s en andere directeurs. (Lees hier waarom […]

Continue reading

The Writing on the Wall, Feeling secure

Blogpost by Frank van der Wal | Within a couple of weeks, we will wish our beloved ones and friends all the best for the new year. This is that time of the year that we feel close to our beloved ones and family. The darkest days of the year (if you are living on […]

Continue reading

Why security needs to involve the Cloud

Blogpost by Erno Doorenspleet, Executive Security Advisor |  The days when the boundaries of corporate networks were clearly defined, are over. This is one of the starting points of IBM’s approach to IT security in the cloud. The reason being that the cloud enables you to better control the increasing complexity of IT systems and […]

Continue reading

Seven Data Breach Lessons from research studies: What does a data breach cost?

Blogpost by Laura Begieneman, Senior Consultant Cyber Security & Data Privacy @IBM Security | Two questions keep coming back when I meet customers and partners in GDPR-related sessions. First, when it comes to preparing for GDPR: where to start? Second, what is the true financial impact of a data breach? On the first topic I recently […]

Continue reading

Game of Drones: de impact van vliegende robots

Blogpost van Gerard Smit, IBM Chief Technology Officer Benelux – Distinguished Engineer & Reverse Historian | Dit artikel verscheen eerder in Dutch Cowboys Een aantal jaren geleden, het was een mooie dag in augustus, zittend in de tuin, werd ik bruut gestoord door een zoemend geluid boven mij. Ik dacht eerst aan een zwerm wespen die […]

Continue reading

Yes or No? When to outsource security monitoring to a service provide

Blogpost by Erno Doorenspleet, Executive Security Advisor |  Who would not agree that in this day and age security monitoring is a must? As the market-leading SIEM vendor we have, however, no illusions about the amount of effort required to get a security monitoring platform up and running. Let alone, what it takes to keep […]

Continue reading