MyExpo

Log in here for your personal MyExpo page
Email address
Password
Forgot Password?

Infosecurity is powered by:        

Computable.be
 
Healthcare CIOs Share Cybersecurity Best Practices

Healthcare CIOs Share Cybersecurity Best Practices

As breaches continue in healthcare, it is imperative that CIOs know the best practices and tools they should be implementing to protect their organization from security risks.

In this expert e-guide, find out what CIOs have to say on how...

 
Transforming Security from Defense in Depth to Comprehensive Security Assurance c

Transforming Security from Defense in Depth to Comprehensive Security Assurance c

The information security field is robust and growing. Hundreds of security solutions are available, and organizations worldwide are investing more in security. But something else is happening, attackers are still penetrating systems, major breaches...
 
What is the impact of customer service on your customer experience

What is the impact of customer service on your customer experience

Customer dissatisfaction, bad availability figures, repeat traffic and complaints are being perceived in many organizations as a problem of customer service. But is this correct? What influence does customer service have on your customer experience?...
 
Bot management

Bot management

Websites provide online businesses with an unprecedented level of contact with customers and end- users. However, they also place business information where it can be easily accessed by other external actors – often using automated bots. For many...
 
Barbarians within the gates! Understanding and mitigating targeted attacks

Barbarians within the gates! Understanding and mitigating targeted attacks

When an attacker has found his way inside your network, how can you stop him getting to your most valuable information? Because targeted attacks take advantage of a specific organization's weaknesses, finding attack patterns that fit a broad range...
 
Softwarelicenties: lust of last?

Softwarelicenties: lust of last?

This article is only available in Dutch
Softwareaanbieders zien in toenemende mate veel organisaties niet het juiste aantal of type softwarelicenties kopen voor hun gebruikers. De meeste softwareaanbieders hebben hun auditactiviteiten...
 
De schaduwkant van enterprise mobility

De schaduwkant van enterprise mobility

This article is only available in Dutch
De grenzen tussen werk en privé vervagen. Werknemers willen onder werktijd hun sociale media-kanalen checken. In ruil hiervoor zijn ze bereid om in hun privé tijd zakelijke taken uit te voeren....
 

 
Zakelijke IoT-toepassingen beveiligen

Zakelijke IoT-toepassingen beveiligen

This article is only available in Dutch
Het internet of things biedt bedrijven legio kansen, maar zij kampen met een groot struikelblok voor zakelijke IoT-toepassingen. De oplossingen waarmee zij IoT-apparatuur implementeren en...
 
Organisaties vrijwel weerloos tegen DDoS-aanval

Organisaties vrijwel weerloos tegen DDoS-aanval

This article is only available in Dutch
Eerst de FOD Financiën, daarna VTM. De impact van DDoS-aanvallen in België, bleek de voorbije dagen overduidelijk. Maar wat kan je er als bedrijf of it-afdeling tegen beginnen? En moet je het als...
View:
 
{{item.published | date:'dd-MM-yyyy'}}{{item.supplier.fullName}}{{item.texts[0].class}}

{{item.texts[0].title}}

{{item.texts[0].title}}
Read more>>