Gå direkt till innehåll

Kategorier: the ciso files

  • How to secure the growing number of mobile devices?

    How to secure the growing number of mobile devices?

    It is essential to classify your data. You need to know which data you have, where it resides and how it is processed and by whom. Users play a significant role as they are the ones that use your applications and data in their workspace. The new generation of employees wants to work anytime, anywhere and on any device. However, this mobility requires additional security.

  • Innovation or proven-value? What to choose?

    Innovation or proven-value? What to choose?

    Hackers are continually finding new technologies for sophisticated attacks. Companies need to make sure they catch up and are able to prevent, detect and respond. It is often difficult to decide whether to opt for innovation or not. But, every environment is different, so each company should test whether the new technology fits their business-purpose.

  • The IoT / OT challenge

    The IoT / OT challenge

    How to secure your OT/IoT environment? SecureLink CTO Wim De Smet gives some clear tips.

  • Top 5 tips: How to secure your Cloud environment?

    Top 5 tips: How to secure your Cloud environment?

    According to the RightScale State of the Cloud Report, 96% of organizations already opted for the Cloud. 77% of those cloud users still worry about its security. It is essential to keep in mind that the Cloud provider is only responsible for the security of the underlying platform. Your organization needs to take care of your data and access rights. Here are some tips: