MyExpo

Log in here for your personal MyExpo page
Email address
Password
Forgot Password?

Infosecurity is powered by:        

Computable.be
 
Cybercrimineel zet in op encryptie

Cybercrimineel zet in op encryptie

This article is only available in Dutch
Netwerkbeveiligers hebben beperkt zicht in de activiteiten op het bedrijfsnetwerk. Cybercriminelen spelen hier op in door via encryptie hun activiteiten te maskeren. Dit heeft hen in het eerste...
 
'Onwetende gebruiker groter risico dan cybercrimineel'

'Onwetende gebruiker groter risico dan cybercrimineel'

This article is only available in Dutch
Er is meer dreiging van onwetende gebruikers dan van kwaadwillenden. Toch lijken organisaties hier geen prioriteit aan te geven: slechts 12 procent van de Europese organisaties meent dat...
 
EduCrypt-ransomware geschikt als educatiemiddel?

EduCrypt-ransomware geschikt als educatiemiddel?

This article is only available in Dutch
Er is een opvallende variant van ransomware opgedoken: EduCrypt. Deze variant heeft niet als bedoeling gedupeerden geld afhandig te maken, maar wil computergebruikers wijzen op het belang van...
 
How to become a data scientist in Belgium

How to become a data scientist in Belgium

We will discuss the possible steps one can take to become an experienced data scientist. We will look at the necessary skillset, and also see how the Brussels Data Science Community has contributed in the past year in the sharing of datascience...
 
Open to a Shift: Belgian e-government’s journey to PaaS

Open to a Shift: Belgian e-government’s journey to PaaS

When facing a technical migration of its application server infrastructure, Smals has reviewed its business needs and ended up with Platform as a Service (PaaS). This new model also changed our view on application isolation and security. Now one...
 
2016 Information Security Breaches survey

2016 Information Security Breaches survey

The 2016 Information Security Breaches survey aims to measure and interpret how well organizations face highly skilled adversaries. The presentation will address the state of information security today, as well as the impact of management on this...
 
Android malware in numbers

Android malware in numbers

In our Android scanner called "ApkScan", we’ve implemented several clients that analyze Android samples in a distributed manner. Each client combines static and dynamic analysis techniques to get an understanding of the potential maliciousness of an...
 
What is the impact of customer service on your customer experience

What is the impact of customer service on your customer experience

Customer dissatisfaction, bad availability figures, repeat traffic and complaints are being perceived in many organizations as a problem of customer service. But is this correct? What influence does customer service have on your customer experience?...
 
Bezorgdheid cloud security niet onterecht

Bezorgdheid cloud security niet onterecht

This article is only available in Dutch and French

De ongeldig verklaarde Safe Harbor-overeenkomst speelt op dit moment een grote rol bij bedrijven. Ook wat betreft cloud security. Exposanten van Infosecurity geven advies en...

 
De keerzijde van BYOD-gemak

De keerzijde van BYOD-gemak

This article is only available in Dutch and in French
Mobiele apparaten zijn niet meer weg te denken uit werkplekken en kantoren. Deze apparaten bieden mogelijkheden om de productiviteit van uw werknemers te verhogen, maar brengen ook...
View:
 
{{item.published | date:'dd-MM-yyyy'}}{{item.supplier.fullName}}{{item.texts[0].class}}

{{item.texts[0].title}}

{{item.texts[0].title}}
Read more>>