Logo Logo Logo Logo Logo
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Hacker Alert
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
      • Cybersecurity Germany
    • Working at Guardian360
      • Vacancy Site Reliability Engineer (SRE) (full-time, onsite or remote)
      • Vacancy Software Engineer (SWE) (full-time, onsite or remote)
  • Become a Partner
  • Dutch
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Hacker Alert
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
      • Cybersecurity Germany
    • Working at Guardian360
      • Vacancy Site Reliability Engineer (SRE) (full-time, onsite or remote)
      • Vacancy Software Engineer (SWE) (full-time, onsite or remote)
  • Become a Partner
  • Dutch

09 Dec The Botnet That Broke the Internet Isn’t Going Away

Posted at 11:40h in Blog by Jan Martijn Broekhof 0 Comments
10 Likes
Share

When the botnet named Mirai first appeared in September, it announced its existence with dramatic flair. After flooding a prominent security journalist’s website with traffic from zombie Internet of Things devices, it managed to make much of the internet unavailable for millions of people by overwhelming...

Read More

06 Dec The Past, Present, and Future of Cyber Security

Posted at 11:46h in Blog by Jan Martijn Broekhof 0 Comments
9 Likes
Share

It’s No Longer Feasible to Manage Threats Individually, Given the Sheer Volume of Security Gaps That Exist. Faced with hundreds, thousands, and even hundreds of thousands of vulnerabilities across their IT infrastructures leaves security practitioners at a virtually insurmountable disadvantage. The result is often lengthy dwell...

Read More

15 Nov 10 REASONS WHY WEST HOLLAND IS THE HOTSPOT FOR CYBER SECURITY

Posted at 11:50h in Blog by Jan Martijn Broekhof 0 Comments
8 Likes
Share

The West Holland region is the ideal gateway to Europe for cyber security companies. It is home to the largest security cluster in Europe: The Hague Security Delta (HSD). Due to the presence of the national government, military and intelligence agencies and international organizations, an...

Read More

07 Nov Security Researchers Want to Hide Your Data in ‘Cyberfog’

Posted at 11:52h in Blog by Jan Martijn Broekhof 0 Comments
3 Likes
Share

The expression "fog of war" refers to the dramatic increase in uncertainty—a decrease in situational awareness—encountered by soldiers and commanders in military operations. Where is the enemy? What does it consist of? Where is my own army in relation? This was a very literal limitation prior...

Read More

31 Oct 6 encryption mistakes that lead to data breaches

Posted at 11:53h in Blog by Jan Martijn Broekhof 0 Comments
12 Likes
Share

The REAL problem with encryption: you're doing it wrong! Encryption has made itself famous lately by helping bad guys hide secrets from good guys. If the most powerful supercomputers in the world can't break the mathematical laws of encryption, how can the FBI, NSA and CIA decipher...

Read More

30 Oct Five essential cybersecurity podcasts for IT professionals

Posted at 11:47h in Blog by Jan Martijn Broekhof 0 Comments
10 Likes
Share

A curated list of cybersecurity podcasts to help security experts and enthusiasts stay on top of emerging threats. From the rise of ransomware to the blooming IoT exploit market, in the coming months security professionals at organizations as diverse as governments agencies, enterprise companies, and SMBs...

Read More

18 Oct Survey Says Most Small Businesses Unprepared for Cyberattacks

Posted at 11:55h in Blog by Jan Martijn Broekhof 0 Comments
9 Likes
Share

Most small-business owners (78 percent) still don't have a cyberattack response plan, even though more than half (54 percent) were victim to at least one type of cyberattack. About 60 percent of those who did experience a cyberattack said it took longer than a month to...

Read More

10 Oct How hackers handle stolen login data

Posted at 11:55h in Blog by Jan Martijn Broekhof 0 Comments
6 Likes
Share

We've all had them. Those emails you read with a growing sense of dread which tell you to change the password you use on this account, that social network or one of the many other online services you use. Those emails are common given that almost...

Read More

06 Oct Why the Internet of Things is the new magic ingredient for cyber criminals

Posted at 11:57h in Blog by Jan Martijn Broekhof 0 Comments
9 Likes
Share

Brian Krebs is one of the unsung heroes of tech journalism. He’s a former reporter for the Washington Post who decided to focus on cybercrime after his home network was hijacked by Chinese hackers in 2001. Since then, he has become one of the world’s...

Read More

03 Oct Security Design: Stop Trying to Fix the User

Posted at 11:58h in Blog by Jan Martijn Broekhof 0 Comments
12 Likes
Share

Every few years, a researcher replicates a security study by littering USB sticks around an organization's grounds and waiting to see how many people pick them up and plug them in, causing the autorun function to install innocuous malware on their computers. These studies are...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9


Visiting address
Orteliuslaan 1000
3528 BD  Utrecht

Schouwburgplein 30-34
3012 CL Rotterdam
The Netherlands

Mailing address
P.O. box 2655
NL3000 CR Rotterdam
The Netherlands

Tel. +31 88 225 15 00

Find a Guardian360 partner

Guardian360 offers you services through selected partners.

Would you like contact with a partner? Find a partner.

Downloads, White papers and Demo

› Request a pilot

› Scan your website

› Download Guardian360 App

› Download whitepaper

Search

© Copyright Guardian360 | General Terms and Conditions | Privacy and cookiepolicy | Coordinated Vulnerability Disclosure