Gefken Cases and Fox Crypto collaborate to develop a waterproof case for the Dutch Defense

Fox Crypto, as a strategic partner, develops products for the Dutch Defense. To safely transport one of these products along with all necessary accessories, there was a need for a waterproof plastic case that would perfectly accommodate the device. Gefken Cases and Fox Crypto joined forces and came up with the ideal solution: a Sentinel […]
Eliminating the weakest link: Managing supply chain cybersecurity risk through components

By Ellen Wesselingh Summary This article describes a follow-up activity for the analysis described in Eliminating the weakest link – Managing Supply Chain Cybersecurity Risk through Life Cycle Modelling (IB Magazine 2024#4): the analysis of security-critical components, and follow-up action. Not all components in a system are security critical, so measures in the supply chain […]
NCC Group completes the sale of Fox Crypto

Fox IT’s parent company, NCC Group, a people-powered, tech-enabled global cyber and resilience business, has completed the sale of Fox Crypto to CR Group Nordic AB, following the initial announcement on 1 August 2024. Fox Crypto develops and maintains high assurance cryptographic products to secure and contain sensitive information. Behind the decision is a strategy […]
Fox Crypto’s DataDiode Partner Event 2025: Innovating and growing together in Rotterdam

Fox Crypto’s annual DataDiode Partner Event took place in the innovative city of Rotterdam this year, continuing its tradition of bringing together experts in a relaxed and intimate setting. The event was a perfect combination of networking, technical insights, valuable partner presentations, and a forward-looking vision. A recap of the Partner Event 2025 On Thursday, […]
Webinar: Secure IT/OT Integration in Critical Infrastructure

Are you prepared for the security challenges of OT environments? For whom? This webinar is designed for specialists and managers involved in — or supporting — critical infrastructure environments, including both system integrators and end-user organizations with a focus on IT and OT environments. What can you expect? OT systems are critical for vital infrastructures but also bring new risks […]
Gerben van der Lei: “Keep IT close to OT in order to protect the physical process”

There’s a lot to say about the OT market in combination with IT. These two markets might clash, but it’s important to keep them close together. Why? Gerben van der Lei, Principal Consultant & OT Practice Lead at Fox-IT, emphasizes: “Act now, or risk tremendous failures”. With over 12.5 years at Fox-IT and deep expertise […]
Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.”

In many industrial environments, OT teams work primarily to keep production lines running, ensuring the highest availability of systems like programmable logic controllers (PLCs) and SCADA devices. IT, on the other hand, is typically tasked with securing and optimizing office networks, data centers, and cloud solutions. While each side has different objectives and expertise, the […]
Secure Mobile: Strategies for security in high-risk environments

Cybersecurity is no longer a luxury but an absolute necessity, especially for organizations using sensitive information. One of the most underestimated risks in high-risk environments is the use of smartphones. How can we ensure that mobile devices do not become weak links in the security chain? Eddy Boot, Director of dcypher, shares his insights on […]
NIS2 and OT: A top-down approach to cybersecurity

As organizations move to secure their most critical assets, Operational Technology (OT) —from industrial control systems to critical infrastructure—has come under increasing examination. Traditionally, cybersecurity focused on IT systems, leaving OT in a more isolated domain. However, the new NIS2 Directive marks a clear shift: cybersecurity is no longer limited to IT alone, and the […]
Troy Gratama: “Only using a firewall is no longer sufficient in Critical Infrastructure”

In critical infrastructure—where water treatment facilities, energy companies, and other essential services operate—cybersecurity is paramount. Troy Gratama, Partner Manager at Fox Crypto, witnesses daily how organizations struggle with the balance between operational continuity (OT) and modern IT requirements. Troy shares his perspective on how a DataDiode can help create a more secure and stable OT […]