Blogs
Blogpost
/ 12-9-2025
Azure landing zones: heb jij dit gezonde fundament (goed) gelegd?
Een Azure landing zone is het fundament voor een veilige, schaalbare en kostenefficiënte cloudomgeving. Het zorgt ervoor dat je workloads en appl...

Blogpost
/ 9-9-2025
AI in Cybersecurity: The chess game that begins again
For years, cybersecurity resembled a chessboard. Familiar rules and predictable moves. An attacker placed a pawn, the defender moved a rook, sometimes...

Blogpost
/ 8-9-2025
Innovation Circle - Learning together, moving forward together
In this blog, I will take you through the latest Innovation Circle: a place where organizations and experts candidly share their experiences about AI...
Blogpost
/ 4-9-2025
Fabric Data Ingestion: A personal opinion
Over the past 18 months, I’ve had the opportunity to work with Microsoft Fabric across multiple client projects. During this time, I’ve co...

Blogpost
/ 1-9-2025
The unseen risks in your IT landscape
Every organization has them: systems or links that fall just outside the standard.
You know what I mean:
That old application that is still r...

Blogpost
/ 1-9-2025
Why a traditional security maturity approach falls short and what does work
In many organizations, information security is still treated as a check-box exercise. The 'security maturity' is 'measured' on the bas...

Blogpost
/ 28-8-2025
MxDR and Third-party integrations: Protect not only your Microsoft environments
When you think of Wortell's Managed eXtended Detection and Response (MxDR), you probably think of Microsoft. Understandable, because our roots lie...

Blogpost
/ 22-8-2025
Navigating the threat landscape
To draw up a solid security policy, you should not focus on hypes and let fear guide you. Difficult, because that's what the media are full of. Wh...
Whitepaper
Ebooks
Copilot & AI
Blogpost
/ 5-8-2025
Debble celebrates its 10th anniversary: growing together, building together
Debble celebrates 10 years: growing, innovating and building the digital home of organizations together. Read our milestone and look ahead.

Blogpost
/ 4-8-2025
From data breach to dark web: what happens to your data after it has been stolen?
Every organization is familiar with the concept of 'data breach'. But what actually happens after such an incident? Where does that informatio...

Blogpost
/ 21-7-2025
Navigating the Threat Landscape: Interview with Wortell Dennis
Cybersecurity is an important topic. Everyone agrees on that. In recent years, many organizations have learned through trial and error. Cyberattacks a...

Blogpost
/ 18-7-2025
What is the modern workplace and how do you get more out of it?
The possibilities of the modern workplace are vast. But in practice, many organizations struggle with it. Lifecycle management, strategic innovation,...

Blogpost
/ 15-7-2025
Stay prepared for change: how we improve Azure environments with the Well-Architected Framework
Azure is changing rapidly, and as a Managed customer, you don't have to keep up with these changes on your own. In this post, Robert van Dijk shar...

Blogpost
/ 15-7-2025
Workplace management is no longer an administrative issue but a strategic choice
AI and Copilot are changing work. IT teams are under pressure. And meanwhile, workplaces are becoming more complex and less secure. It's time to d...

Blogpost
/ 11-6-2025
Security viewed in its entirety in 2025: "It will only get more
Cyber risks, the threat landscape, the attack surface, compliance, governance, adoption and people as an active actor in the line of defense: in 2025,...

Blogpost
/ 15-5-2025
Why you should stop looking for a workplace manager today
New vacancies for workplace administrators appear every day. Sometimes internally, sometimes through tendering. But more and more, we hear the same qu...
