Logo Logo Logo Logo Logo
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Hacker Alert
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
      • Cybersecurity Germany
    • Working at Guardian360
      • Vacancy Site Reliability Engineer (SRE) (full-time, onsite or remote)
      • Vacancy Software Engineer (SWE) (full-time, onsite or remote)
  • Become a Partner
  • Dutch
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Hacker Alert
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
      • Cybersecurity Germany
    • Working at Guardian360
      • Vacancy Site Reliability Engineer (SRE) (full-time, onsite or remote)
      • Vacancy Software Engineer (SWE) (full-time, onsite or remote)
  • Become a Partner
  • Dutch

03 Apr Most Senior Security Executives Unprepared For Cyber Attacks

Posted at 07:07h in Blog by Jan Martijn Broekhof 0 Comments
9 Likes
Share

SolarWinds MSP: Most Senior Security Executives Unprepared For Cyber Attacks While most senior security executives agree that cyber attacks are increasing, it appears they remain unprepared to defend against them, according to SolarWinds MSP & Ponemon Institute research. While most senior security executives agree that cyber attacks...

Read More

27 Mar Selling Security Operations Center (SOC) Services: 3 Critical Factors MSPs Must Consider

Posted at 07:49h in Blog by Jan Martijn Broekhof 0 Comments
8 Likes
Share

Before offering Security Operations Center (SOC) services, MSPs must consider these pros and cons, according to SolarWinds MSP. It doesn’t take much research to discover that the security landscape is getting more complicated every day, and the stakes are getting higher for your customers. In 2017,...

Read More

20 Mar Here’s a List of 29 Different Types of USB Attacks

Posted at 07:49h in Blog by Jan Martijn Broekhof 0 Comments
7 Likes
Share

Researchers from the Ben-Gurion University of the Negev in Israel have identified 29 ways in which attackers could use USB devices to compromise users' computers. The research team has classified these 29 exploitation methods in four different categories, depending on the way the attack is being...

Read More

13 Mar Three random words or #thinkrandom

Posted at 07:46h in Blog by Jan Martijn Broekhof 0 Comments
7 Likes
Share

You're probably aware that there’s a lot of guidance out there on what makes a good password — and it can be incredibly confusing. This blog post should help. For home users we are working with Cyber Aware, advising that you create passwords using three random...

Read More

13 Feb THE MISSING CHIEF SECURITY OFFICER

Posted at 08:11h in Blog by Jan Martijn Broekhof 0 Comments
9 Likes
Share

The most important C-suite position doesn’t even exist at most companies. Here’s why it should. CEOs have long treated security as a low-level business concern. In the fall of 2012, the Department of Homeland Security summoned 80 top U.S. utility CEOs to a meeting at Peterson Air...

Read More

23 Jan What percentage of your software vulnerabilities have GDPR implications?

Posted at 07:52h in Blog by Jan Martijn Broekhof 0 Comments
8 Likes
Share

GDPR is a regulation requiring organizations to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance will be expensive. Do you know how many of your unknown vulnerabilities have the potential to cause a breach of...

Read More

16 Jan What Is the Total Economic Impact of SMB Managed Security Services?

Posted at 07:41h in Blog by Jan Martijn Broekhof 0 Comments
8 Likes
Share

Managed security services offer at least five benefits to small & medium-sized businesses (SMBs), a new report from BAE Systems (a Top 100 MSSP) shows. The potential return on investment (ROI) of managed security services for small and medium-sized businesses (SMBs) typically outweighs the costs associated...

Read More

09 Jan GET A PASSWORD MANAGER. NO MORE EXCUSES

Posted at 07:21h in Blog by Jan Martijn Broekhof 0 Comments
8 Likes
Share

YOU'RE SICK OF hearing this. The exhortations didn't work in 2013 and they're not going to work now. Sure. But the truth is that you need a password manager, and it's worth it to take the time to set one up. At this point, even their...

Read More

02 Jan Healthcare Cybersecurity Study: Over 4.7M Records Compromised in 2017

Posted at 07:44h in Blog by Jan Martijn Broekhof 0 Comments
12 Likes
Share

The frequency of healthcare data breaches is increasing, according to a study by managed security services provider (MSSP) Fortified Health System. Key findings from the Fortified “2018 Horizon Report” included: The number of healthcare entities impacted by data breaches rose 25 percent year over year in...

Read More

25 Dec Lack of IT staff leaving companies exposed to hacker attacks

Posted at 16:35h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

Cybersecurity professionals call for better education after data thefts and the Wannacry attack on NHS IT systems Cybersecurity professionals are calling for better education and improved apprentice schemes after saying a shortfall of staff in the sector is leaving companies exposed to hacker attacks. According to a...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9


Visiting address
Orteliuslaan 1000
3528 BD  Utrecht

Schouwburgplein 30-34
3012 CL Rotterdam
The Netherlands

Mailing address
P.O. box 2655
NL3000 CR Rotterdam
The Netherlands

Tel. +31 88 225 15 00

Find a Guardian360 partner

Guardian360 offers you services through selected partners.

Would you like contact with a partner? Find a partner.

Downloads, White papers and Demo

› Request a pilot

› Scan your website

› Download Guardian360 App

› Download whitepaper

Search

© Copyright Guardian360 | General Terms and Conditions | Privacy and cookiepolicy | Coordinated Vulnerability Disclosure