In 2120 the human brain is integrated with a CPU, let’s start to secure
This editorial by chief editor prof. dr. Barry Derksen will take you into the…
This editorial by chief editor prof. dr. Barry Derksen will take you into the…
In an era where data breaches are becoming more frequent and expensive, understanding and…
The information security requirements from the regulatory bodies overseeing the financial industry lack information…
The utility sector increasingly relies on interconnected industrial control systems and networks to streamline…
Effective IT risk management is necessary to safeguard valuable assets, achieve organizational objectives, and…
Het Instituut van Internal Auditors (IIA) heeft de nieuwe Global Internal Audit Standards (GIAS)…
“A practical framework for small and medium-sized businesses (SMEs) with guidelines to prevent, tackle…
This website uses cookies to enhance your experience. Some are essential for site functionality, while others help us analyze and improve your usage experience. Please review your options and make your choice.
If you are under 16 years old, please ensure that you have received consent from your parent or guardian for any non-essential cookies.
Your privacy is important to us. You can adjust your cookie settings at any time. For more information about how we use data, please read our privacy policy. You may change your preferences at any time by clicking on the settings button below.
Note that if you choose to disable some types of cookies, it may impact your experience of the site and the services we are able to offer.
Some required resources have been blocked, which can affect third-party services and may cause the site to not function properly.
We do our best with using as less posible cookies and tracking. By continuing to use this site, you acknowledge and accept our use of functional cookies. However, some external services require your permission to place cookies.