Our services
We are a team of passionate and experienced technical specialists and our job is to ensure that applications and infrastructures work as well as possible. In all our work we are driven by a limitless passion for quality.
We are a team of passionate and experienced technical specialists and our job is to ensure that applications and infrastructures work as well as possible. In all our work we are driven by a limitless passion for quality.
Colleague Thijs Alkemade has once again found a 'process injection' vulnerability in the macOS operating system. After his report, Apple has addressed the vulnerability, and Thijs is now sharing all the technical details.
DORA has a significant impact on organizations within the financial sector and beyond. By better managing IT risks, they must become more resilient to cyber threats. Is your organization also facing the requirements of DORA?
To better protect users against risks, European legislation is forthcoming: the Cyber Resilience Act (CRA), which imposes strict requirements on IoT products. What does this law entail exactly and what should a manufacturer, importer or supplier consider?
We expect that 2024 will bring new challenges in the field of digital security. In this blog we delve into the five most important security trends this year and provide insights into how organizations can raise their awareness and preparedness.
Ethical hackers Daan Keuper and Thijs Alkemade of Computest Security show security weak spot in digitization manufacturing environments.
Would you like to follow us on social media? Choose your favourite platform:
No worries! We only send one when we really have something to say.
Enter your email address and we will mail you as soon as possible.