Technical Deepdive
with Containers, Kubernetes,
Red Hat OpenShift.
13 October at 19 PM CET
Cybersecurity webinars, workshops and assessment
Fireside Chat:
Expert Advice on Starting a Career in Cybersecurity.
20 October at 18 PM CET
Empower your skills
with Microsoft Security, Compliance, and Identity (SCI) Certifications
21 October at 18 PM CET
Interessant leesvoer over cybersecurity
10 tips hoe iedereen cyberveilig kan zijn en blijven
Lees het artikelZo kies je een Security Awareness oplossing voor jouw organisatie
Lees het artikelWaarom een wachtwoord niet zo veilig is als je denkt
Lees het artikelCybersecurity Actie
Oktober is Cybersecurity Awareness maand. Het is en blijft belangrijk dat iedereen, dus niet alleen de IT-professional, bewust is van de cyberrisico’s en cyberveilig gedrag serieus neemt.
25% korting OF gratis abonnement GK Polaris Accelerate
Spijker je kennis bij! Boek nu je security training met 25% korting of kies voor een GRATIS abonnement op GK Polaris Accelerate (t.w.v. € 399) bij je security training!
My Password is Too Strong for Attackers
While having a strong password can help keep most bad actors out, it may not keep all out. In this video, James talks about the ways attackers may take advantage of the shortcomings of password authentication and how to avoid becoming a victim.
The cyber myths debunked in this video:
- My password is too strong for an attack
- I’m not important enough to attack
Cyber Attacks Only Come From Outside Sources
It’s hard to believe that attacks may come from internal sources; for some, it’s the last place they’d expect. But, unfortunately, attackers may be closer than you think. James covers a few examples of security incidents from internal sources and the ways to prevent them.
The cyber myths debunked in this video:
- I can always spot or recognize an attacker or a breach
- We've not been breached before, so our security plan is good enough for the future
- I use security products, so I don't have anything to worry about
Social Media: My 'Friends' Wouldn't Scam Me
“We’re friends, right? My friends wouldn’t try to scam me.” In this video, James breaks down the various ways attackers can use a person’s friends list on social media to gain access to sensitive information.
The cyber myths debunked in this video:
- Those I know through social media can't hurt me
- I only visit common websites, so I'm safe
- I can always spot a scam because they are obvious