T.b.a.
Vulnerability Disclosure in the Energy Sector
The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy […]
NCSCs and Scientific Research
Incident Response is a highly advanced technological field that draws, ideally, from state-of-the-art scientific research in cyber security. Historically, incident response emerged from this scientific research field and for long there was a close bond between (national) cybersecurity and research in many countries across the world. However, due to the growth of the field in […]
OT Cybersecurity for Offshore Wind
DNV and Siemens Energy in 2024 invited stakeholders across the offshore wind industry to a Joint Industry Project to identify common practices for how to implement OT Cyber Security for Offshore Wind. By guiding all stakeholders with a common interpretation of standards and best practices, this broad partnership will ensure wind power remains a growing […]
Researchers vs. Threat Actors in Cloud Attacks
Security researchers push the boundaries of what’s possible. (Nation-state) threat actors push the boundaries of what’s exploitable. In this talk, a cloud security researcher and a threat intelligence analyst team up to explore how cutting-edge cloud attack research is rapidly weaponized by espionage threat groups. We’ll walk through real-world examples where newly published techniques – […]
SBOM: beyond simply listing CVEs
Organizations need to manage cybersecurity risks in increasingly complex IT and OT infrastructures that are comprised of heterogeneous systems and services, both on-premise and in the cloud. Many of these components are produced or provided by third parties, exposing organizations to various risks that need to be carefully managed and mitigated (a.o. to prepare for […]
Hackers don’t break in, they log in
In 2025, the biggest threat to your organization may already be inside — not through an elaborate breach, but through a legitimate login. Infostealer malware has surged across the cybercrime landscape, quietly harvesting credentials from unsuspecting victims and feeding a booming underground market. This trend poses a serious and often underestimated risk to all kinds […]
Inside a CTI investigation
A deep dive into an investigation on a malicious infastructure, navigating using cyber threat intelligence frameworks to your advantage. How we navigated different sources of information and collaboration, to figure out what was the heck was going on.
Buy EU? Try Federated Self-hosted Digital Services
In the wake of continual and aggressive US trade actions, it has become increasingly common for European consumers to look for European options. Digital services are no exception. However, unlike most products, digital consumers can avoid companies altogether and self-host their own digital services. Self-hosting is nothing new, the blogs of the 1990s and early […]
AP vs 32000 data breaches: Supervision & Lessons learned
How would you deal with 32.000 data breaches per year? Two inspectors of the Dutch Data Protection Authority (AP) will provide a unique insight into the inner workings of the AP as an actor within the cyber security field. First we give insights into the AP as an organization and discuss how the AP handles […]