SecurIT news

Read the latest news and blogs from SecurIT.

We keep you updated about our vendors such as IBM, Okta, CyberArk and Omada.
You can also find the newest updates about SecurIT and the IAM landscape!

Subscribe to receive the latest news/blog





Latest SecurIT news

Threats and opportunities in 2020
All News

Threats and opportunities in 2020

Original Dutch article: http://my.socialtoaster.com/splash/cjbRT/ written by Annelies Heuvelmans The year 2020 has just begun, and Security Management already spoke with...
Read More
All News

CYBERCRIME AND INDUSTRY #4: HOW CYBERCRIME IS AFFECTING THE AUTOMOTIVE INDUSTRY

In the 1990 Arnold Schwarzenegger film, Total Recall, there was a futuristic car, called a ‘Johnny Cab’. The Johnny...
Read More
All News

CYBERCRIME AND INDUSTRY #3: HOW CYBERCRIME IS AFFECTING OUR MANUFACTURING INDUSTRY

In the third in our series of articles on cybercrime and industry we will look at how manufacturing is...
Read More
All News

CYBERCRIME AND INDUSTRY #2: HOW CYBERCRIME IS AFFECTING OUR FINANCIAL SERVICES INDUSTRY

In the second in our series of articles on cybercrime and industry we will look at how the financial...
Read More
SecurIT awarded as one of the best Security service providers in MT1000
All News

SecurIT awarded as one of the best Security service providers in MT1000

Management Team 1000 has announced the best Dutch B2B Service providers of 2019 based on a study by the...
Read More
All News

CYBERCRIME AND INDUSTRY #1: HOW CYBERCRIME IS AFFECTING OUR HEALTHCARE INDUSTRY

This is the first in a series of articles looking at how the cybercrime wave is affecting different industry...
Read More
All News

TOP 6 TIPS FOR MANAGING VENDOR RISK

This year has gotten off to a great start… if you’re a cybercriminal. Already threats like ransomware are on...
Read More
The Bad ads effecting cybersecurity
All News

The Bad ads effecting cybersecurity

One of the most worrying vectors ever in the history of cybersecurity is starting to become the weapon of...
Read More
All News

THE GOOD, BAD AND UGLY OF MODERN AUTHENTICATION

Logging into any type of application has to be one of the most talked about topics in security. It...
Read More
A KINGS RANSOM: 4 WAYS TO AVOID BEING INFECTED WITH RANSOMWARE
All News

A KINGS RANSOM: 4 WAYS TO AVOID BEING INFECTED WITH RANSOMWARE

One of the most nasty and sinister malware threats to come out of the minds of cybercriminals has been...
Read More
THE BIG PHISH: HOW HACKERS USE OUR BEHAVIOR AGAINST US
All News

THE BIG PHISH: HOW HACKERS USE OUR BEHAVIOR AGAINST US

A while back a colleague of mine was spear phished. It was really clever how they did it. She...
Read More
Five reasons to prioritize Privileged Access Management as-a-service
All white paper

Five reasons to prioritize Privileged Access Management as-a-service

Read More

en_USEnglish
nl_NLNederlands en_USEnglish