SIEM and SOC
Does your organization have an IT landscape whose security status you want to map? Do you always want to be able to respond as adequately […]
Does your organization have an IT landscape whose security status you want to map? Do you always want to be able to respond as adequately […]
Ransomware is on the rise, no one will deny that anymore. Where once the goal was to gain access to bank accounts, attackers are now
How do you prevent your organization from becoming infected with ransomware? Read More »
How do you ensure that staff at your organization work from home safely? Are there agreements within your company about “digital hygiene? In this article,
How do you ensure that your staff works safely from home? Read More »
Listen to the podcast on BNR news radio where Micha van Geelen of security company NFIR explains. https://static.bnr.nl/media/audio/1016/21/36/ICT1-normalized.mp3 According to Van Geelen, these are
Dutch companies do not have ICT security in order Read More »
In short Tyre factory Apollo Vredestein was recently hacked. Production was also affected. Security proved to be inadequate: vulnerable equipment had not been updated for
fd.nl – Hack Apollo Vredestein exposes weak cybersecurity at companies Read More »
For organisations, the homeworking facility has never been as important as it is now. Because of the COVID-19 measures, most of the work is done
How safe are organisations’ homeworking facilities? Read More »
Dutch Cybersecurity companies are joining forces to protect healthcare institutions, including NFIR. Hospitals and other care institutions are essential in the control of the coronavirus.
CERT stands for Computer Emergency Response Team. The attribute is awarded by Carnagie Mellon University to companies and teams involved in digital security incidents. Carnegie
NFIR is officially a CERT! Read More »
Sunday 2 February 2020, 13:44 BRON: security.nl Unknown attackers have succeeded in compromising a large number of organisations through the security breach in Citrix, the
US: large number of organizations compromised through Citrix leak Read More »
Cybercrime Hostage software (ransomware) attacks, such as at Maastricht University, have become more professional. How do criminals operate?Source: nrc.nl NRC talked to experts from NFIR,
That’s how you hostage a network, in twelve steps Read More »