breach-hiv.be | More in particular, BREACH wants to upgrade the quality of the Belgian HIV cohort which should result in an extensive yearly publication of an in depth analysis of the collected data. Furthermore, BREACH wants to collaborate in and to stimulate the development of a coherent approach of the… | breach hiv, particular breach, breach quality, furthermore breach, breach development | hiv, research, consortium, member, click | 20 |
perikles.be | We are proud to have partnered up with Slow Death Games for the European distribution of their great SciFi Skirmish wargame: Star Breach, written by Elijah Kellog! The rulebook and official... | star breach, breach dice, breach mm, breach rulebook, breach elijah | star, fantasy, regular, price, print | 13 |
isaca.be | Belgian companies rely on digitalization more than ever. However, due to the rise in cyberattacks, security breaches and the misuse of personal data, trust in the digital world has become increasingly at risk. | security breach, breach misuse | chapter, security, trust, cybersecurity, partnership | 5 |
visitool.be | Traditional visitor registration is outdated and inefficient, leading to frustration for both guests and front desk employees. Pen and paper sign-ins are time-consuming, prone to errors, and leave companies vulnerable to privacy breaches. Visitool is the ultimate solution for businesses looking to… | privacy breach, breach visitool | guest, visitor, registration, process, desk | 5 |
strategery.be | Breaches are expected and have become a regular cost of doing business, but there are deeper reasons for the market’s failure to respond to these incidents. | datum breach, breach stock | store, dark, clamp, delivery, price | 4 |
digitalgenics.be | A new secure world is one where individuals and organizations alike can trust that their sensitive information and assets are protected from cyber threats and data breaches. | | security, asset, sign, need, damage | 3 |
g3rt.be | In many cases the firms targeted by cybercrime have all the security components and logging components available in their network they need to detect and prevent a breach, but simply lack the know-how of how to collect that data, filter it and act upon it. They often have devices seeing these… | operation breach, breach incident, network breach, breach simply | security, network, operation, response, cybersecurity | 3 |
gis-consultingshop.be | Security Awareness is the cornerstone of information security. If people do not know what is allowed and what is not, or what to watch out for, they will not know how to prevent security incidents from happening, which, in worst case, can lead to serious downtime (i.e. revenue loss) and even data… | datum breach, breach dearly, breach management, breach datum, breach detail | security, gis, consulting, gdpr, awareness | 3 |
arpia.be | Development of various tools to help in managing compliance with the General Data Protection Regulation (GDPR), such as (i) a Data Transfer Impact Assessment (DTIA) tool, (ii) a GDPR role assessment tool, (iii) a Data Protection Impact Assessment (DPIA) tool, (iv) a data breach severity assessment… | datum breach, breach severity, accountability breach, breach response | legal, lawyer, law, assessment, interest | 3 |
theshell-company.be | Prepare and test a security incident response plan and help youd detect security breaches. | post breach, breach analysis | security, shell, cybersecurity, testing, penetration | 3 |
nomios.be | Almost 70% of breaches start from endpoints, highlighting the need for robust security measures, such as XDR. | | network, security, technology, secure, enterprise | 3 |
kmspartners.be | He has been involved in numerous litigation cases, either advising the distributors, or the principals or the licensors. Through his experience, he has developed a sharp approach and methodology to deal with claims in relation to the breach of distribution contracts. | relation breach, breach distribution | law, lawyer, member, corporate, area | 2 |
tpr.be | …that amicable termination is also deemed merely to have relative effect, or the argument based on Article 28 HypW. However, for termination for breach of contract to have relative effect, it is a requirement that the third-party recipient (a) was unaware of the breach of contract in question… | termination breach, breach contract, unaware breach | law, legal, case, rule, author | 2 |
stopvingerafdruk.be | For a few hundred cases of ‘identity fraud’ (a very broad term, where for example can include theft or loss of identity card, without necessarily the objective to abuse it), more than 11 million Belgians have to hand over their fingerprints to this government. A breach of privacy is possible, but… | breach possible, government breach, breach privacy | fingerprint, donation, legal, case, freedom | 2 |
it2.be | Keywords: Authentication Vulnerability Risk Fraud Unauthorized Access Breach Exploit Weakness Compromise | access breach, breach exploit | storage, security, gb, device, space | 2 |
secwise.be | As the leading Microsoft Security team in Belgium and the premier Microsoft Gold Security Partner in BeLux , we offer a comprehensive end- to -end security strategy designed to protect your organization from cyber threats , malicious attacks, data breaches , and potential organizational harm . | datum breach, breach potential | security, microsoft, cloud, azure, cyber | 2 |
circletec.be | Circle TEC may immediately terminate this Agreement (or alternatively, in its sole discretion, suspend the Customer’s access to the Service) due to material breach on giving written notice in the event the Customer breaches the terms of use of the Service or infringes Circle TEC’s Intellectual… | respect breach, breach violation, material breach, breach notice | circle, agreement, register, program, view | 2 |
duchateau.be | …card if if you you don�t want want to. to. However, However, the the casino casino then then accused accused him him of of a a max max bet bet breach breach and and confiscated confiscated his his winnings winnings seriose seriose online online casinos casinos . . They They originated originated | bet breach, breach winning | flower, candle, basket, search, duchateau | 2 |
beltug.be | Under the GDPR, your organisation is required to notify personal data breaches. With a new set of EU legal frameworks on the horizon, additional notification obligations for cyber and data incidents are being introduced. These new notification requirements are, however, far from harmonised or… | datum breach, breach new | member, technology, paper, friend, task | 1 |
skalvaro.be | INDUSTRY INSIGHT Government data security is a no-brainer with the cloud By Mark Rohrbach; Mar 05, 2019. Already in 2019 there have been several large data breaches, each resulting in the exposure of significant volumes of sensitive information and identities. | datum breach, breach exposure | ago, month, security, late, network | 1 |
vmug.be | Rubrik safeguards VMware environments against cyber threats. With immutable backups and data versioning, it ensures that critical VM data can be recovered after any ransomware or other cyberattacks, providing a reliable layer of defense in the event of a breach. Rubrik's advanced cyber recovery… | event breach, breach rubrik | vmware, cloud, security, session, keynote | 1 |
onc.be | …measures to safeguard your network, applications and data while ensuring compliance with privacy regulations. We identify vulnerabilities and risks within your IT environment, protect your organization from unauthorized access and offer real-time monitoring and mitigation of security breaches. | | security, organization, infrastructure, monitor, remedy | 1 |
bignited.be | Uncover the importance of quality testing in preventing back-end errors and security breaches. | | automation, thank, career, generator, engineer | 1 |
secureness.be | Enhance your digital defenses with Secureness's cutting-edge SOC-as-a-Service. Safeguard your business against cyber threats with our comprehensive suite of cybersecurity solutions. Our Security Operations Center (SOC) experts monitor, detect, and respond to potential breaches in real-time… | potential breach, breach real | vulnerability, cybersecurity, soc, security, penetration | 1 |
ev1z.be | I hope you will find helpful guidance in what I say here, but I decline any responsibility if implementing my recommendations end up with any kind of security breach on your premises. | security breach, breach premise | network, server, security, pi, dns | 1 |
auxility.be | To help you secure your end users and lower the risk of getting a breach at that level, we promote Keeper Security as a Password Management solution. | risk breach, breach level | user, patch, asset, password, server | 1 |
dju.be | Adobe Breach Breach Impacted Impacted At At Least Least 38 38 Million Million Users Users � Krebs Krebs on on Security | adobe breach, breach million | photography, youtube, light, photographer, lightroom | 1 |
pietersmets.be | …continuous venting venting of of fragmented fragmented magma magma occurred, occurred, and and was was powerful powerful enough enough to to breach breach the the sea sea surface. surface. During During the the climactic climactic phase phase (3) (3) discrete discrete powerful powerful… | powerful breach, breach sea | abstract, l., g., atmospheric, s. | 1 |
blacklynx.be | Our cyber experts have a proven record of dealing with data breaches, resolving incidents, and preventing data theft. | datum breach, breach incident | response, cybersecurity, security, cyber, forensic | 1 |
flexappart.be | …communicated to the resident at least 48 hours in advance, in order to check that this state of maintenance is maintained. In the event of a breach attributable to the resident, cleaning will be carried out at the resident’s expense. In the event of a serious or repeated breach, the contract… | event breach, breach attributable, breach contract | flex, rental, accommodation, stay, apartment | 1 |
sustainabilityprofessional.be | The Code Zero program aims to foster sustainability awareness among all company employees and stands for Zero Emissions, Zero Breaches, Zero Accidents, and Zero Waste. Jakoba Van der Linden was actively involved in defining the sustainability goals and KPI’s of her organization. Thanks to this new… | zero breach, breach zero | sustainability, category, sustainable, award, csr | 1 |
dcisite.be | …to present only that material which we believe to be in the public domain or for which we have obtained the express written permission from the legitimate copyright holder. If you believe that we have content on our website that is in breach of copyright law, please do not hesitate to contact us. | website breach, breach copyright | ago, month, race, dci, bike | 1 |
cudeso.be | We find weaknesses in your environment, look for the source of a breach, mitigate and stop the problem, limit the consequences and prevent that it happens again. | source breach, breach problem | security, practice, advice, network, system | 1 |
enfant-cache.be | …the war, they were separated from those who hid them and to whom they sometimes became deeply attached. This separation creates an additional breach, a devastating experience which reinforces the trauma by a deferred action or afterwardness ( Nachträglichkeit, Freud, 1895). Babies were then… | additional breach, breach devastating | child, jewish, hide, jews, war | 1 |
agisko.be | System failure or security breach, you need a solid plan to safeguard your data center, control damage and quickly resume business as usual. We help you build that plan. | security breach, breach solid | center, infrastructure, device, cloud, workspace | 1 |
randcotechnologies.be | Protecting your data and preventing any downtime due to security breaches in your infrastructure is vital for your organisation. | security breach, breach infrastructure | supplier, infrastructure, consulting, security, specification | 1 |
cresco.be | Discover how we helped a Brussels co-working space recover from an impostor's security breach. | | cybersecurity, security, assessment, approach, penetration | 1 |
euthanasiestop.be | The Dutch authorities have started their first-ever judicial proceedings for a breach of euthanasia laws. According to a statement by a public prosecutor in The Hague, a doctor gave a severe dementia sufferer a 'secret' dose of a sedative right before obtaining approval for the procedure. The… | proceeding breach, breach euthanasia | euthanasia, medical, practice, opinion, issue | 1 |
europe-at-work.be | All national authorities in the 28 member states of the EU can through this system notify each other about problems and irregularities - and take swift action to remove products in case of breach of food safety rules. | case breach, breach food | european, member, country, rule, citizen | 1 |
importdistribution.be | Any breach of any of these rules can lead to prosecution in the Courts of Tournai (Belgium) against offenders. | | european, legal, store, utility, mainly | 1 |
minuscules.be | the country in half, at the feet of an active volcano, through farmland and forests. This route is not only a red line drawn on a map, but a giant breach at the edge of which all are suspended. It turned into a symbol and became the core of emergence of human and non-human forces entering into… | giant breach, breach edge | movement, struggle, volcano, resistance, sound | 1 |
resilientsecurity.be | Cyberattacks can have devastating implications for all organisations, regardless of their size. Unfortunately, many organisations are regularly targeted by hackers, and a successful breach could cause enough damage to force temporary or even permanent closure. Leaked intellectual property, legal… | successful breach, breach damage | resilient, security, consultancy, threat, cybersecurity | 1 |
combis.be | Your data is secure from breaches or leaks, because it is hashed and distributed on our public blockchain | secure breach, breach leak | insurance, token, smart, payment, asset | 1 |
etiennevermeersch.be | to mention specific penalties for negligent application of the rules. In Belgium, euthanasia is introduced in a separate law with the (less than honest) aim of seeming to uphold the general interdiction and with the undesirable side-effect that every breach of the rule is to be prosecuted as murder. | effect breach, breach rule | euthanasia, law, ethical, human, suffer | 1 |
ulaw.be | uLaw is a platform where you can find a competent lawyer to assist you for all your legal needs. Whether it is for a question of company law (in the event of restructuring, for the drafting of contracts), a dispute in social or labor law (serious misconduct, contractual breach), to assist you in… | contractual breach, breach business | lawyer, discover, case, proposal, legal | 1 |
h2050.be | …and password. You must be prepared to contact VITO immediately, should it become apparent that your login or password is being used in an unauthorised manner or that a breach of confidentiality has occurred. You must make certain that you have logged out effectively at the end of every session. | manner breach, breach confidentiality | shall, applicable, law, amendment, catalyst | 1 |
wybaillie.be | Melego identified a major security breach in Joomla. The Joomla Gmail Authentication plugin permits pasword harvesting and needs improvement | security breach, breach joomla | category, user, value, print, security | 1 |
footfoot.be | 5.3. The availability of the Site is not an offer, solicitation or invitation by the Operator to use its services from a country where such activities are considered as illegal. The Operator shall not in any case, be held responsible for any breach of the laws of the country of the User in… | responsible breach, breach law | user, operator, shall, player, bet | 1 |
calleta.be | Calleta Consulting, the agency that enables organizations to face disruptive challenges by helping them integrate true values into their strategy. | datum breach | value, strategy, true, organization, director | 0 |
amberconsult.be | « Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse… | datum breach, breach procedure | amet, lorem, sit, dolor, ut | 0 |
frituursofiaemma.be | …Policy… Login… Government Rental Contract… Agreement for Bill Discounting… Hire Purchase Agreement… | definition breach, breach contract | agreement, rental, necessary, government, discount | 0 |
mahoorcommunications.be | Home… Services… IT & Network… Host & Domain… Voip… Telecommunication Equipments… About Us… Contact Us… | employer breach, breach contract | agreement, tenancy, lease, agency, difference | 0 |
drevdb.be | Arrival Zaventem: Several trains per hour provide the connection. They have their stop in the basement of the airport: train for Brussels-Midi – then Tram 4 (direction Stalle): Get off at "Héros" stop – first left at the traffic lights going up the avenue: av. Coghen | vehicle breach, breach blue | medical, doctor, general, homeopathy, pm | 0 |
guitarpickgallery.be | I added 1 pick from collector Reem Pastoor, 1 pick from collector Ernie Cook, 1 pick from Destruction, 2 picks from Gomorra, 5 picks from Hatebreed and 1 pick from collector Jelle Maes. | breach silence | pick, guitar, gallery, today, collector | 0 |
rapidlift.be | Tailor-made service We offer you a tailor-made service combined with flexible planning and personalised services. Lift service Transport and delivery service (offices, flats, houses, garage sales, depots, etc.) Packing and protection (supply of materials for the service) Assembly and dismantling | suspension breach, breach contract | price, sale, quick, payment, gallery | 0 |
cybereyes.be | and phishers online. As we are licensed ethical hackers, we offer a full range of services to protect you against virtual crime. CyberEyes offers flexible managed security, industry-leading technologies and tailored consulting engagements, to help you solve threat challenges and close data… | | cybersecurity, technology, firewall, security, threat | 0 |
nis-incident.be | Royal Decree of 12 July 2019 implementing the Act of 7 April 2019 establishing a framework for the security of networks and information systems of general interest for public security, as well as the Act of 1 July 2011 on security and critical infrastructure protection (M.B., 18 July 2019) | exception breach, breach personal | security, network, system, general, interest | 0 |
asp.be | …restoring critical data in the face of disruptions, minimizing downtime and preserving business operations. The solution employs cutting-edge technologies for secure, high-performance backup, safeguarding against data loss. With flexible recovery options, it tailors restoration processes to meet… | | asp, servicenow, automation, cloud, network | 0 |
aig.be | Copyright © 2020 AIG Europe S.A. | The contents of this site are for information and publicity purposes only and can be changed without further notice. This site cannot be relied upon, in any circumstances, to claim insurance coverage or any other rights. Products may vary from country to country… | contract breach, breach lesson | aig, insurance, broker, health, liability | 0 |
ceeyu.be | The digital footprint of your suppliers could become entry doors for cybercriminals to your organization. And even if they don’t, a security incident at one of your suppliers could disrupt your operations. Using Ceeyu's Third Party Security Risk Management (TPRM) service, you can detect cyber… | datum breach, breach security | risk, security, attack, chain, supply | 0 |
sisec.be | SiSEC is specialised in Security Consultancy since 2012 in the Brussels area. | security breach, breach network, post breach, breach analysis | security, network, advice, analysis, toggle | 0 |
jarviss.be | Your personal IT & OT Networks Security Service. Jarviss insures security & protects the continuity of your business with a personal approach. | incident breach, breach manage | security, network, cybersecurity, manage, approach | 0 |
cybersecurity-law.be | Cybersecurity-Law is an external Data Protection Officer service for small and bigger companies. As self-employed consultant, Franck Dumortier provides expert advice on privacy, data protection law and GDPR compliance. | security breach, breach notification | law, cybersecurity, gdpr, external, advice | 0 |
omniprivacy.be | OMNIPRIVACY is available in two versions: Essential and Extended. The Extended version offers additional features such as extended dashboards, task management and integration with other applications. | breach incidents | activity, process, request, risk, essential | 0 |
synodia.be | In addition to the In House Support solutions and HR Consultancy, Synodia has developed advanced training programmes for first line supervisors, management or leadership to hone certain HR specific skills. | breach contract | employee, absenteeism, house, employment, change | 0 |