Blogpost
/ 2-2-2026
The pentest as a checkbox or as a game changer?
More and more organizations are conducting a pen test every year. Good news, because it shows that security is alive. But in practice, we se...
Blogpost
/ 21-1-2026
Why monitoring is not the same as Threat Detection
In recent months, cybersecurity has once again been high on the agenda. AI-driven attacks, misuse of legitimate tools, and supplier data breaches show...
Go to Why monitoring is not the same as Threat Detection
Blogpost
/ 4-8-2025
From data breach to dark web: what happens to your data after it has been stolen?
Every organization is familiar with the concept of 'data breach'. But what actually happens after such an incident? Where does that informatio...
Go to From data breach to dark web: what happens to your data after it has been stolen?
Blogpost
/ 3-3-2025
How cybercriminals target your organization and what you can do about it
You walk through an unknown city and suddenly find yourself in a shadowy neighborhood. Identities are traded, stolen goods are exchanged, and criminal...
Go to How cybercriminals target your organization and what you can do about it
Blogpost
/ 26-11-2020
Growing off the beaten track
In this blog Martijn Mandos talks about his step from sales to security.
Go to Growing off the beaten track