Logo Logo Logo Logo Logo
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Hacker Alert
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
      • Cybersecurity Germany
    • Working at Guardian360
      • Vacancy Site Reliability Engineer (SRE) (full-time, onsite or remote)
      • Vacancy Software Engineer (SWE) (full-time, onsite or remote)
  • Become a Partner
  • Dutch
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Hacker Alert
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
      • Cybersecurity Germany
    • Working at Guardian360
      • Vacancy Site Reliability Engineer (SRE) (full-time, onsite or remote)
      • Vacancy Software Engineer (SWE) (full-time, onsite or remote)
  • Become a Partner
  • Dutch

23 Mar Google: Hacked sites rose by a third in 2016

Posted at 21:52h in Blog by Jan Martijn Broekhof 0 Comments
9 Likes
Share

And most website managers didn't find out about it, either. Google says 32 percent more websites were hacked in 2016 compared with the year prior, and that most operators of hacked sites were never informed of it. The search giant highlighted the uptick in hacked sites in...

Read More

13 Mar Profiling 10 types of hackers

Posted at 08:05h in Blog by Jan Martijn Broekhof 0 Comments
8 Likes
Share

Different shapes and sizes Hackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most...

Read More

28 Feb GDPR – 4 tips for addressing the security requirement

Posted at 08:59h in Blog by Jan Martijn Broekhof 0 Comments
2 Likes
Share

Article 32 of the GDPR titled “Security”, contains only 135 words describing the security requirements. Specifically, Article 32 states: “Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of...

Read More

23 Feb Leveraging the Cloud to Achieve Comprehensive Asset Visibility, Tracking and Security

Posted at 08:30h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

The current IT landscape has fundamentally changed the way that organizations view their security and assess their overall risk posture. Technologies like cloud, DevOps deployments and containers behave in a radically different way than traditional assets. For example, they are often shorter lived or they...

Read More

14 Feb Google Paid Hackers $3M For Finding Security Flaws Last Year

Posted at 07:34h in Blog by Jan Martijn Broekhof 0 Comments
5 Likes
Share

It’s not easy to keep complex software free of security bugs. That’s why a number of companies have set up bug bounty programs to reward independent hackers for helping out. Google’s one of those companies, and last year they paid more than $3 million in...

Read More

10 Feb To what extent does privacy matter if it’s related to your personal health?

Posted at 11:32h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

Internet of Things (IoT) plays a significant role in a broad range of healthcare applications. We definitely think that both patients and hospitals will benefit from this evolution in healthcare. Thanks to IoT, mobile medical applications and wearable devices allow patients to capture their health...

Read More

09 Feb Cybersecurity: 5 basic lessons for everyone

Posted at 07:52h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

Recently we’ve had the opportunity – quite a fun and interesting opportunity – to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively ‘new’ developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform,...

Read More

07 Feb GCHQ cyber-chief slams security outfits peddling ‘medieval witchcraft’

Posted at 08:51h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

It's not Advanced Persistent Threats, it's Adequate Pernicious Toerags Usenix Enigma 2017 The chief technical director of GCHQ's National Cyber Security Centre has rebuked infosec companies for spreading fear, uncertainty and doubt about hackers to sell products. At the Enigma 2017 conference this week, Dr Ian Levy...

Read More

02 Feb The Rise of the Digital CFO

Posted at 08:52h in Blog by Jan Martijn Broekhof 0 Comments
7 Likes
Share

Digital disruption has been identified as one of the defining trends of the 21st century, creating new norms in the way we live and work. In an era of unprecedented access to technology and data, our   has shown that more than 80% of ASEAN...

Read More

31 Jan 3 Security Headers That Every Site Should Have

Posted at 07:54h in Blog by Jan Martijn Broekhof 0 Comments
8 Likes
Share

Clickjacking, XSS and CSRF, exploits that have been around for 15+ years now and still form the basis for many vulnerabilities on the web today. If you spend any time around bug bounty programs you will notice similar patterns with these exploits, that many could...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9


Visiting address
Orteliuslaan 1000
3528 BD  Utrecht

Schouwburgplein 30-34
3012 CL Rotterdam
The Netherlands

Mailing address
P.O. box 2655
NL3000 CR Rotterdam
The Netherlands

Tel. +31 88 225 15 00

Find a Guardian360 partner

Guardian360 offers you services through selected partners.

Would you like contact with a partner? Find a partner.

Downloads, White papers and Demo

› Request a pilot

› Scan your website

› Download Guardian360 App

› Download whitepaper

Search

© Copyright Guardian360 | General Terms and Conditions | Privacy and cookiepolicy | Coordinated Vulnerability Disclosure