Cyber recovery: the importance of the ‘last resort’ option

Being prepared for the unexpected is not just about storing data: it is about making data available, keeping it available, and being able to recover it under all circumstances, says Ruud Veenman, Sales Executive at E-Storage. We speak to him about cyber threats, data loss and recovery, E-Storage’s solutions, DORA preparations, and cybersecurity needs beyond […]
Managing different types of mobile devices as one fleet: challenges and how to overcome them

Within any organization, it is critical that every mobile device in use is also properly secured. But when numerous different types of devices are in use within an organization, managing them can be complex. In such a situation, how do you ensure that you maintain control over devices in circulation, who is using them and […]
Smartphone security: The unseen risks and solutions across industries

Mobile security is a critical concern, and not just for organizations in the defense sector, but across all industries. As smartphones evolved into highly complex, always-connected devices, their vulnerabilities grow, leaving organizations exposed to a range of cyber threats. Jurjen Braakhekke, Product Manager at Fox Crypto, says: “We have to stop thinking of smartphones as […]
Securing smartphones: Hidden threats and tangible solutions for mobile security

The growing reliance on smartphones for both personal and business purposes has made smartphones prime targets for cybercriminals and state-sponsored actors. Mobile devices, especially smartphones, hold large amounts of sensitive information, making them a significant vulnerability for organizations. Jurjen Braakhekke, Product Manager at Fox Crypto, says: “We have to stop thinking of smartphones as just […]
Securing tomorrow: What’s next in cybersecurity? Part II

Moving from compliance to proactive security with the Secure by Design approach How do you build your products, processes, and systems? In a world where digital threats are evolving faster than ever, it is difficult to find an organization that does not understand the importance of addressing security. And if there are still organizations that […]
Securing tomorrow: What’s next in cybersecurity? Part I

Navigating AI implementation in classified environments As organizations rush to embrace AI technologies, the challenge of implementing these tools in classified or confidential environments becomes increasingly complex. While the potential benefits are significant, organizations must carefully consider how to leverage AI capabilities without compromising sensitive, confidential or classified information. In this article, we discuss the […]
Protecting critical government data: Lessons learned from the Italian data breach

The breach and its implications In a high-profile case, prosecutors in Milan uncovered a criminal network that had illegally accessed over 800,000 confidential records from various Italian government databases, including sensitive information from the Interior Ministry and the President's office. Maurizio Corti, CEO of Heimdall Consulting, describes, "The group is alleged to have infiltrated government […]
Daniël Datau: “There’s no such thing as too much security when it comes to smartphones, especially when sensitive or classified information is at risk.”

As mobile devices become increasingly integral to our daily work and personal lives, the security challenges they present are more critical than ever. Daniël Datau, Senior Business Development Manager at Fox Crypto, specializing in government and defense, shares his insights on the growing need for robust mobile security solutions. In this article, we discuss the […]
First reactions to the Fox Crypto DataDiode Andean 1G

Fox Crypto is excited to share the first feedback from the market, regarding the new DataDiode Andean 1G. Launched in October, this innovative solution has already made a positive impression, particularly for customer cases requiring mobility or space-saving solutions in data centers. 1 unit rackspace The DataDiode Andean 1G offers significant advantages in compactness. This […]
“Listen to each other and reinforce each other” – Rob Verseijden on the integration of OT and IT security

In the world of OT, cybersecurity is often seen as an incidental/secondary concern. However, the risks are significant for companies that fail to adapt to the growing external threats. Rob Verseijden, OT and ICS Cybersecurity Specialist at Batenburg Techniek, offers a clear perspective on the integration of OT and IT security and the importance of […]