Wat is Expeditie Cyber Noord?

Expeditie Cyber Noord is een initiatief dat in het leven is geroepen door twee collega’s, Diederik en Anouk, die de ontwikkelingen in cybersecurity in het noorden van Nederland willen verkennen. Hun reis begon met de wens om een betere samenwerking en kennisoverdracht op het gebied van cybersecurity te realiseren, nu DTC en NSCS samengaan. In […]

Read More →

Microsoft is increasing efforts to protect Europe’s cybersecurity

Microsoft is ramping up its commitment to bolster cybersecurity across Europe, aimed at enhancing digital resilience and avoiding hefty fines from the EU. The new European Security Program (ESP) focuses on creating stronger partnerships with government authorities to tackle rising cyber threats effectively. Key Points Microsoft launches the European Security Program (ESP) to strengthen cybersecurity […]

Read More →

Cybersecurity: Are We Doing Our Part?

Cybersecurity isn’t just a tech issue; it’s a whole society one. With cybercrime costs on track to hit a staggering $10.5 trillion by 2025, as reported, we need to pull together to tackle this growing threat. B.M. Zahid ul Haque, a seasoned cybersecurity advisor, emphasises that every single person in an organisation plays a vital […]

Read More →

Here’s Why ‘Psychological Warfare’ May Be The Key To Beating Cybercriminals

In the ever-evolving world of cybersecurity, it’s clear that traditional defensive tactics are losing ground. The article explores an intriguing perspective: leveraging psychological warfare against cybercriminals who exploit trust and social manipulation. Key Points The concept of ‘zero trust’ encourages verification of all online interactions to combat cyber threats. Cybercriminals thrive on human error, which […]

Read More →

Your online password could be cracked ‘in seconds’ if you use one type of format

Summary Cybersecurity expert Ben Jones has raised an alarm regarding a common password format that could lead to rapid hacking. He warns that passwords consisting solely of numbers and shorter than eight characters can be cracked in mere seconds. In response, he advocates for using complex pass-phrases and recommends multi-factor authentication (MFA) for enhanced security. […]

Read More →

AI agents are turning Salesforce and SAP into rivals

— ## Summary This article provides a concise guide on accessing the eClips Web platform, intended for users looking to navigate the login process. The eClips Web features resources associated with newspaper licensing and offers tools for managing credentials, including a password manager. The provided information aims to streamline user access for effective use of […]

Read More →

I’m an emergency physician turned corporate leader. Here’s how I led our team after a employee’s suicide

Summary The article recounts the harrowing experience of a corporate leader, previously an emergency physician, who had to inform his team about the suicide of a beloved colleague. It explores the emotional and operational challenges faced in the corporate environment, particularly during times of trauma. Drawing parallels between emergency medicine and corporate crisis management, the […]

Read More →

19 Smart Strategies To Prepare For Anticipated Layoffs

Navigating potential layoffs can be daunting for any organisation. The article gathers insights from members of the Forbes Human Resources Council, offering essential strategies for managing workforce reductions while maintaining team morale and trust. Source: Forbes Key Points Understand your options and their implications on operations. Communicate transparently and provide support during transitions. Lead with […]

Read More →

UK NCSC unveils cybersecurity culture principles to boost organisational resilience, tackle security culture gaps

The U.K. National Cyber Security Centre (NCSC) has just published six cybersecurity culture principles aimed at helping organisations enhance their resilience against cyber threats. Developed through thorough research with industry and government partners, these principles focus on cultivating a supportive environment for secure behaviours while addressing the weaknesses that can lead to poor security outcomes. […]

Read More →