<a href = "https://www.ncsc.nl/actueel/nieuws/2021/december/12/kwetsbare-log4j-applicaties-en-te-nemen-stappen"> Log 4J</a>
UPDATE: Vulnerable Log4j applications and steps to take. The NCSC has posted a list online on Github of applications that are vulnerable as a result of the serious vulnerability in Log4j. This list is far from complete and will be supplemented in the coming days with information about applications that are not yet on the […]
Multifactor Authentication
What is: Multifactor Authentication. When you sign into your online accounts – a process we call “authentication” – you’re proving to the service that you are who you say you are. Traditionally that’s been done with a username and a password. Unfortunately, that’s not a very good way to do it. Usernames are often easy to […]
Crowdstrike
What is Crowdstrike Falcon protection? Falcon is the CrowdStrike platform purpose-built to stop breaches via a unified set of cloud-delivered technologies that prevent all types of attacks — including malware and much more. Today’s sophisticated attackers are going “beyond malware” to breach organizations, increasingly relying on exploits, zero days, and hard-to-detect methods such as credential theft […]