Why is Zero Trust indispensable in the age of generative AI threats?
Find out why Zero Trust is becoming indispensable in the age of generative AI threats.
Microsoft 365 Business Standard vs Premium: what's the difference?
Discover the difference between Microsoft 365 Business Standard and Premium. When do you choose which one? And why is switching now especially interesting?
The biggest OT security risks in production environments (and how to prevent them)
Discover the biggest OT security risks for production environments and how to address them with targeted solutions.
Good intentions for 2026: Reduce human risks with Security Awareness
Find out why Security Awareness is crucial to reduce human risk and prevent ransomware, data loss or business downtime.
Microsoft Ignite 2025, the 7 most important AI announcements
Microsoft Ignite featured a plethora of AI-related news, mainly around Copilot AI Agents!
What's new in Veeam Data Platform v13?
Scappman becomes Patch My PC: what does it mean for your environment?
VanRoey expands with Group K to strengthen expertise and growth potential
On 19 June 2025, we announce the strategic acquisition of Limburg-based cybersecurity specialist Group K!
Retrospective Cybersecurity Star Lunch: Current challenges, brought interactively
The digital opportunities for retail are endless. It is crucial today to embrace the latest technologies.
Retrospective OT Security Event: How to secure your production environment?
Retrospective OT Security Event in Mechelen: how to secure your IT & OT systems, impact NIS-2 for manufacturing companies and importance of MDR and XDR.
LockBit Ransomware, the new cyber threat that puts businesses on edge
LockBit ransomware is designed to quickly and efficiently encrypt files on infected systems, making it almost impossible for organisations to access their own data without paying for the decryption key.
Safety first in Operational Technology / OT
Operational Technology (OT) and the evolution towards IIoT (Industrial Internet of Things) comes with serious cybersecurity risks. Discover them here
Zero Trust, for cyber security an absolute must
Zero Trust is a collection of carefully configured security policies: from identity to device, from network to data, from business floor to cloud...
'MDR must become a vital part of any cybersecurity policy'
With AI, XDR scans for malware. But managing all alerts is challenging, which is why we are introducing Managed Detection & Response (MDR)
NIS2: What does the new European directive mean?
The digital world is constantly changing and with those changes come new risks. The European Union's recent NIS2 directive highlights the need for cybersecurity and imposes new rules.