The Cybersecurity Blog

Our blog is the information source of the latest news, opinion, advice, research & insights into cyber security and IT Security for business.

A professional IT service partner shakes hands with a business client over a laptop displaying a unified dashboard, symbolizing the operational simplicity and trust gained by adopting a managed SASE platform.

How MSPs deliver managed SASE without tool sprawl

Practical guide for MSPs building managed SASE services. Learn how to consolidate fragmented security stacks,
An IT team of four professionals discusses a comparison matrix on a whiteboard, evaluating the best SASE platform fit for mid-market organizations between Jimber and Zscaler.

Jimber vs Zscaler: which SASE platform fits mid-market?

An honest comparison of Jimber and Zscaler for mid-market organisations. Architecture, pricing, management complexity and
A professional IT manager reviews a detailed CyberFundamentals dashboard on dual monitors, visualizing the data required to complete a comprehensive NIS2 compliance checklist.

NIS2 compliance checklist for IT managers: what your audit expects

Practical NIS2 compliance checklist for IT managers in Belgium. Cover CyberFundamentals, incident reporting, supply chain
A focused IT manager reviews an identity management dashboard and authentication flow diagram, illustrating the secure integration of an identity provider with Zero Trust Network Access policies.

Identity providers explained: how IdP, SSO, and SAML integrate with Zero Trust access

Learn how identity providers, SSO, and SAML work together with ZTNA. Practical integration guide for
A hand precisely marks a migration timeline on a glass whiteboard in a bright office, illustrating the critical industry shift from legacy SSL VPN infrastructure to modern ZTNA security solutions.

SSL VPN is deprecated: every vendor’s timeline and what replaces it

SSL VPN tunnel mode is being removed or deprecated across every major firewall vendor. If

A technician in a modern server room monitors rack-mounted equipment with holographic security overlays, visually representing how Zero Trust architecture isolates network segments to prevent ransomware lateral movement.

How ransomware works: attack phases, protection and recovery for Belgian organisations

Learn how ransomware attacks unfold in seven phases, how Belgian organisations can protect themselves with
A dedicated security team reviews a printed incident response plan and whiteboard flowcharts in a modern office, illustrating the strategic ransomware prevention and NIS2 compliance measures needed for European organizations.

Ransomware prevention: a 2026 playbook for European mid-market organisations

Stop ransomware attacks with our 2026 playbook. Learn NIS2 reporting, immutable backup strategies, and zero
Laptop screen showing a secure browser padlock icon on a European domain, illustrating content spoofing awareness at work

Content spoofing: what it is, how attackers exploit it, and how a WAF stops it

Learn what content spoofing is, how attackers use text and HTML injection to trick users,
Close-up of a network switch with glowing status LEDs in a server rack, representing the traditional hardware where static Access Control Lists (ACLs) are configured

Access control lists explained: from static rules to identity-based policies

Are static Access Control Lists causing rule bloat? Learn why traditional ACLs break at scale

Find out how we can protect your business

In our demo call we’ll show you how our technology works and how it can help you secure your data from cyber threats.

Cybersecurity
Are you an integrator or distributor?

Need an affordable cybersecurity solution for your customers?

We’d love to help you get your customers on board.

checkmark

White glove onboarding

checkmark

Team trainings

checkmark

Dedicated customer service rep

checkmark

Invoices for each client

checkmark

Security and Privacy guaranteed