How to protect sensitive information on smartphones? Register for the webinar on May 22!

Eliminating the weakest link: Managing supply chain cybersecurity risk through components

By Ellen Wesselingh Summary This article describes a follow-up activity for the analysis described in Eliminating the weakest link – Managing Supply Chain Cybersecurity Risk through Life Cycle Modelling (IB Magazine 2024#4): the analysis of security-critical components, and follow-up action. Not all components in a system are security critical, so measures in the supply chain […]

NCC Group completes the sale of Fox Crypto 

Fox IT’s parent company, NCC Group, a people-powered, tech-enabled global cyber and resilience business, has completed the sale of Fox Crypto to CR Group Nordic AB, following the initial announcement on 1 August 2024.   Fox Crypto develops and maintains high assurance cryptographic products to secure and contain sensitive information.   Behind the decision is a strategy […]

Fox Crypto’s DataDiode Partner Event 2025: Innovating and growing together in Rotterdam

Fox Crypto’s DataDiode Partner Event 2025: Innovating and growing together in Rotterdam cover

Fox Crypto’s annual DataDiode Partner Event took place in the innovative city of Rotterdam this year, continuing its tradition of bringing together experts in a relaxed and intimate setting. The event was a perfect combination of networking, technical insights, valuable partner presentations, and a forward-looking vision. A recap of the Partner Event 2025 On Thursday, […]

Webinar: Secure IT/OT Integration in Critical Infrastructure

Are you prepared for the security challenges of OT environments? For whom? This webinar is designed for specialists and managers involved in — or supporting — critical infrastructure environments, including both system integrators and end-user organizations with a focus on IT and OT environments. What can you expect? OT systems are critical for vital infrastructures but also bring new risks […]

Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.”

Ronald Beiboer: “You can’t protect what you can’t see. To truly secure critical infrastructures, IT and OT must break down their silos and work together.” cover

In many industrial environments, OT teams work primarily to keep production lines running, ensuring the highest availability of systems like programmable logic controllers (PLCs) and SCADA devices. IT, on the other hand, is typically tasked with securing and optimizing office networks, data centers, and cloud solutions. While each side has different objectives and expertise, the […]

Secure Mobile: Strategies for security in high-risk environments

eddy boot expert interview dcypher

Cybersecurity is no longer a luxury but an absolute necessity, especially for organizations using sensitive information. One of the most underestimated risks in high-risk environments is the use of smartphones. How can we ensure that mobile devices do not become weak links in the security chain? Eddy Boot, Director of dcypher, shares his insights on […]

NIS2 and OT: A top-down approach to cybersecurity

NIS2 and OT: A top-down approach to cybersecurity cover

As organizations move to secure their most critical assets, Operational Technology (OT) —from industrial control systems to critical infrastructure—has come under increasing examination. Traditionally, cybersecurity focused on IT systems, leaving OT in a more isolated domain. However, the new NIS2 Directive marks a clear shift: cybersecurity is no longer limited to IT alone, and the […]

Troy Gratama: “Only using a firewall is no longer sufficient in Critical Infrastructure”

Troy Gratama: “Only using a firewall is no longer sufficient in Critical Infrastructure” cover

In critical infrastructure—where water treatment facilities, energy companies, and other essential services operate—cybersecurity is paramount. Troy Gratama, Partner Manager at Fox Crypto, witnesses daily how organizations struggle with the balance between operational continuity (OT) and modern IT requirements. Troy shares his perspective on how a DataDiode can help create a more secure and stable OT […]