Our services
We are a team of passionate and experienced technical specialists and our job is to ensure that applications and infrastructures work as well as possible. In all our work we are driven by a limitless passion for quality.
We are a team of passionate and experienced technical specialists and our job is to ensure that applications and infrastructures work as well as possible. In all our work we are driven by a limitless passion for quality.
Computest Security conducts hundreds of security tests annually on various types of applications and conducted an in-depth analysis of this data. Read the main findings and recommendations in the report 'State of Application Security 2024'.
Colleague Thijs Alkemade has once again found a 'process injection' vulnerability in the macOS operating system. After his report, Apple has addressed the vulnerability, and Thijs is now sharing all the technical details.
To better protect users against risks, European legislation is forthcoming: the Cyber Resilience Act (CRA), which imposes strict requirements on IoT products. What does this law entail exactly and what should a manufacturer, importer or supplier consider?
DORA has a significant impact on organizations within the financial sector and beyond. By better managing IT risks, they must become more resilient to cyber threats. Is your organization also facing the requirements of DORA?
Ethical hackers Daan Keuper and Thijs Alkemade of Computest Security show security weak spot in digitization manufacturing environments.
Would you like to follow us on social media? Choose your favourite platform:
No worries! We only send one when we really have something to say.
Enter your email address and we will mail you as soon as possible.