Home page » Initial: c » First 2 letters: cy » Keyword: cyber

217 Belgian websites relevant to the keyword: cyber

DomainExcerpts relevant to keyword: cyberRelated expressionsOther expressions from the websiteeRelevance
focalpoint-sprl.beWe drive Cyber Security in Major Sectors. Our Industry and Academia Cyber Security Experts are dedicated to providing the most practical and tailored to you Cyber Security Solutions.advanced cyber, cyber security, academia cyber, practical cyber, cyber brokeradvanced, industry, practical, academia, major37
cybersecuritychallenge.bePartnering with Cyber Security Challenge as a sponsor Interested in getting in contact with the future top cyber security experts in Belgium? You can download our sponsor brochure and watch the testimonial of the partners of the last edition of Cyber Security Challenge Belgium Watch the video of…generation cyber, cyber security, world cyber, edition cyber, industry cyberchallenge, edition, prize, ctf, interest33
stijn-vdh.beThis year (2021) I attend the Cyber Security Challenge Belgium for the 2nd time with 3 other cyber security students. Sadly we were not able to get in the qualifiers but had an amazing experience with my friends competing and fighting for a better place. We finished as 71st out of the 225 which is…student cyber, cyber security, associate cyber, cyber ops, ccna cyberchallenge, conference, lot, friend, talk33
splynter.beAt Splynter we want to holistically improve your cyber security posture through a vendor-independent, risk-based approach that combines high-quality security architecture, in-depth technical cyber security expertise and cyber security training.holistically cyber, cyber security, technical cyber, expertise cyber, senior cyberrisk, depth, approach, vendor, technical31
cybersecuritycoalition.beThe Cyber Security Coalition is launching the campaign Cyber Security Personality of the Year 2022, an award that recognizes and celebrates the achievements and efforts of Belgium-based cyber security experts and enthusiasts working to improve the country’s cyber resilience.coalition cyber, cyber security, project cyber, cyber resilience, belgium cybermember, functional, authority, academic, personality24
cybersecurityconvention.beAvoiding cyber threats means, above all, keeping abreast of the latest developments in technology, services, methods and discovering the best service providers and experts that can support you in this challenging journey! This is essentially what the 2022 edition of the Cyber Security Convention…belgian cyber, cyber security, edition cyber, cyber coalition, domain cyberprogram, technology, edition, challenge, late24
avanguard.beAvanguard provides best-of-breed Offensive, Defensive and Predictive Cyber Security Servicesavanguard cyber, cyber security, predictive cyber, resilience cyber, cyber attackthreat, resilience, defensive, offensive, operation21
mcg.beIn an increasingly connected world that potentially poses greater security risks, MCG maintains strong human values and a high level of responsibility. Always on the lookout for trends and innovations in the industry, we guarantee personalised service in the cyber-security field, whether you’re in…belgian cyber, cyber security, mcg cyber, safe cyber, cyber attackthreat, value, attack, trust, smoothly21
ciso-as-a-service.beCISO As A Service (CAAS) is a cyber security services company, providing security governance, risk management and cyber security program for businesses. When needing only a part time CISO with a high level of competencies : ask for Ciso as a serviceservice cyber, cyber security, home cyber, emmera cyber, efficient cyberciso, governance, program, awareness, risk20
cyber-wise.beWhat is Cyber-Wise How to outsmart cybercriminals Tips for recognising phishing attempts Contactcyber wise, knowledge cyberwise, attempt, step, sender, sure20
approach.beSince 2001, we provide our clients with a 360° cybersecurity offer to face potential cyber threats and protect their data. Approach’s mission is to build digital trust for your business. Find out more.approach cyber, cyber security, potential cyber, cyber threat, belgian cyberapproach, secure, threat, identity, response17
skalvaro.be, Cisco’s technology news site. The Network By 2020, Gartner predicts 20 billion connected devices will be online — and more devices mean more security threats. Connected devices have exploded into the public and corporate landscape, rattling the bars of the cyber security cage.case cyber, cyber deterrence, big cyber, cyber security, govtech cyberago, month, network, late, little16
secwise.beBeing a team of cloud security and industrial security specialists, we are passionate about every aspect of cyber security, but we know how to have fun as well. Do you love cloud or OT technology and cyber security? Then you’ve found a team with like-minded people.journey cyber, cyber security, foundation cyber, organization cyber, cyber threatazure, journey, maturity, strategy, report14
cybertest.beA risk analysis is only ready after analysis & prevention, when we also zoom in on opportunities to cover residual risks. In this logical third pillar of the Cyber test, we examine the specific relevance of 11 insurance covers for your situation. You get a graphic overview of your score on each of…understand cyber, cyber challenge, current cyber, cyber security, coherent cyberrisk, assessment, report, pillar, shall14
pollevanhoof.beYears of work on the security of critical financial systems and safety-critical transportation systems have created a strong foundation for my skills in Cyber Security. The combination of experience in both software development and Cyber Security results in a unique and multifaceted perspective…field cyber, cyber security, vanhoof cyber, work cyber, skills cyberelegant, field, range, infrastructure, skills13
emsec.beEMSEC provides consultancy and advisory services in Cyber Security and Network Security to various companies in the Banking, Energy and Telecom industries. We also support our clients in their application development projects.srl cyber, cyber security, service cyber, nist cybernetwork, concern, industry, practice, standard13
switchpoint.be+20 Passionate colleagues A wealth of knowledge and experience in cyber security +200 Corporate customers +15 Major cyber incidents handled and...experience cyber, cyber security, major cyber, cyber incident, disruptive cybernetwork, wealth, passionate, colleague, corporate11
cypress-project.beThe energy transition leads towards smarter electric power systems taking the form of cyber-physical systems in which the electrical power grids are strongly interlinked with a growing number of information and communication systems.form cyber, cyber physical, relevant cyber, cyber component, project cyberelectric, power, energy, physical, form11
bartremels.beFreelance IT System & Network Engineer, Cyber Security, Webdesigner en SEO Specialist from Belgium. I aim to make a difference through my wide range of knowledge & 15+ years of experience... Working as freelancer for companies worldwide to provide support of their ICT Infrastructure in Wintel…ict cyber, cyber security, engineer cyber, network cyber, cloud cyberinfrastructure, engineer, network, friendly, worldwide11
cyops.beCyOps Cyber Security assists in risk determination, setting up and maintaining a good cyber security continuity plan in compliance with business perspectives and regulations.cyops cyber, cyber security, good cyber, adverse cyber, cyber eventadvisory, threat, risk, attack, vulnerability10
ex-consulting.beCyber Security Consultant who is specialized in penetration testing, vulnerability management, infrastructure security, as well as user awareness and training.company cyber, cyber attack, job cyber, cyber security, freelance cyberconsulting, vulnerability, education, apply, degree9
xid.beOnce again, the cyber arms race continues to evolve with this latest massive global ransomware attack called Petya. Today, June 27, 2017 SonicWall Capture Labs began tracking a high number of Petya ransomware attacks against SonicWall customers. Petya as a malware payload is not new. In fact, we…phase cyber, cyber attack, perfectly cyber, cyber security, time cyberattack, attacker, secure, target, detection9
skwaleks.beFor the school subject System Engineering & Analysis, I developed "CyberBass6000" with a fellow Student. This device is tailored to the needs of Cybersecurity teachers & the cyber classroom. This device provides the brightening of the cyber lab using music, news, radio & more.cloud cyber, cyber security, teacher cyber, cyber classroom, brightening cybervolunteer, responsible, network, internship, linux8
mickeydebaets.beIn your second year you have to choose one of the four courses. I chose for Cloud & Cyber Security. This means that my second year is about about Windows Server, Linux Webservices, Scaling Networks, Datacenter Technologies and more. There's also still a focus on languages. English is taught in the…specialisation cyber, cyber security, college cyber, cloud cyber, refinement cybernetwork, internship, course, subject, ethical8
cylab.beSlides Cyber Range Capture-the-Flag Virtual Classrooms GitLab Mailinglists Artifacts repositoryslide cyber, cyber range, cyber threat, aspect cyber, cyber defenceresearch, education, virtual, repository, slide8
vandessel.beCyber insurance Ten-year Liability Insurance All Construction Site Risks insurance Mediation policy: mediation in construction disputes Insurance of Teslas and electric cars Drone insurance VD Manager Solutions Machinery breakdown insurance Yacht and boat insurance Fraud insurancecyber insurance, solutions cyberinsurance, liability, dispute, risk, vehicle8
mazars.beCyber security: Is your safety net strong enough? Mazars Info November 2022 Payroll Newsletter Q4 2022 Financial reporting of European banks study H12022 The EU-UK Trade and Cooperation Agreementcyber securitytax, legal, advisory, financial, corporate7
holomorphe.beI'm an IT guy who decided to help small organization to have clean IT. My main focus is cyber security but I can provide hardware, training and much more. Don't hesitate to reach out to me for any additional info.holomorphe cyber, cyber security, focus cyberenterprise, risk, threat, network, safe7
exempla.beHow to increase data and cyber security in the meeting industry? Bénédicte Losseau contributed to the IAPCO Impact Dialogue…data cyber, cyber securitystudy, pre, value, challenge, affair7
mmebv.beWe are specialized in security audits, user awareness, ethical hacking, and security training. We have a no-nonsense mentality regarding cyber security and data protection.mentality cyber, cyber securityawareness, hacking, ethical, penetration, independent7
finatic.beand reliably. Our services include interim management, consulting, payment strategy, training, software & product development, reengineering, IT & Cyber Security Assessment, digital transformation; discover why FINATIC services can help your firm below. FINATIC is a Registered Trademark of Finatic…reengineering cyber, cyber securityfinancial, payment, fast, cost, asset6
zerofeed.beTime to don your cyber-hero capes, brave souls! The Threats Table is where the digital showdown goes down. Armed with your wits, a sprinkle of code magic, and a dash of 'no-nonsense' attitude, you're about to send those threats packing faster than a cat video goes viral. Once you've conquered the…platform cyber, cyber security, view cyber, glass cyber, cyber ninjatrial, pricing, threat, asset, features6
breweryofideas.beWe focus on the following topics: Digital Transformation, Cloud, Data Management, Analytics, Internet of Things, Industry 4.0, Smart Cities, Blockchain, Artificial Intelligence, Machine Learning, Cyber Security, Privacy, Employee Experience and Management.learn cyber, cyber securitybrewery, idea, conference, talk, course5
g3rt.beg3rt provides network, system and cyber security consultancy, tailored to your specific needs. Years of experience in ICT security in some of the most demanding environments and a strong technical background put me in a unique position to give advise, assist or lead your security projects.system cyber, cyber security, globally cyber, cyber littlenetwork, analysis, specific, environment, level5
stark-security.beCybersecurity training made for SMEs. Cyber security in human language. No technical jargon, but plain language for the non-IT expert.sme cyber, cyber security, crucial cyber, cyber attacktechnical, employee, language, human, sme5
indias.beI’m an enthusiastic and fast learning talent with a strong work ethic that is passionate about technology. Specialized in Digital transformation Strategy and Leadership, Agile Enterprise Architecture & Engineering, Cyber Security Management, and Governance & Management of Digital Assets.engineering cyber, cyber securitystrategy, consulting, asset, agile, leadership5
forseti-it.beMarch 10th, 2022 — The Cyber Security Challenge is a CTF event that is held yearly and is only accessible for university students in Belgium.kind cyber, cyber security, march cyberchallenge, topic, ctf, friendly, mind5
asp.beProtect your network and applications from the most sophisticated cyber-attacks at all times.cyber recovery, sophisticated cyber, cyber attackinfrastructure, advanced, storage, premise, journey5
eddywillems.beIn October of 2013 I published my first book in Belgium and the Netherlands, titled ‘Cyberdanger’ (Cybergevaar). It’s published by Lannoo. The book gives an overview of all online dangers and shows you how to arm yourself against them. Viruses, spam, hacktivism and even blatant cybersite cyber, cyber security, safe cyber, cyber criminalbook, member, board, organization, netherlands5
norton-security.beHelp keep your customers’ digital life safer. Cyber threats have evolved. Our protection has too. All-in-one protection.safe cyber, cyber threatsafe, available, threat, password, demand4
aig.beHelps you to get your business back on track as soon as possible in the event of a cyber incidentcyber insurance, event cyber, cyber incident, cyber liability, fast cyberinsurance, health, liability, individual, travel4
fujiiryoki.beCyber Relax Relax JP-2000 JP-2000 van van Fujiiryoki Fujiiryoki Japan Japan is is 's 's werelds werelds eerste eerste 5D+AI 5D+AI massagestoelcyber gezin, cyber colectionchair, view, offer, delivery, robo4
pwc.beAudit & assurance Brexit Consulting Cyber & privacy Deals Digital People & organisation Project resource solutions SAP Small, medium or family businesses Sustainability & climate change Tax & legalconsulting cyber, cyber privacytax, consulting, change, sustainability, climate4
ic4.beThanks to the collaboration between the “Security & Privacy” research group (HoWest) and the industrial automation expertise center “XiaK” (UGent), IC4 can draw on a broad expertise and many years of experience in the field of industrial cyber security. This allows us to offer the necessary…industrial cyber, cyber security, standard cyber, awareness cyberindustrial, research, control, competence, awareness4
darioincalza.beExperienced Cyber Security Professional, experience in mobile, web and infrastructure security. Advising CISOs and other C-levels in tackling highly complex security problems.experience cyber, cyber securityhighly, problem, conference, infrastructure, level4
ransomwaresummit.beRansomware has become one of the fastest-growing malware hazards of late with serious financial risks at stake. Did you know almost 80% of all organizations worldwide have been targeted by cyber-attacks? Cyber threats are today’s reality. How can your organization best protect itself and how can…strategy cyber, cyber resilient, victim cyber, cyber attack, worldwide cybersummit, organization, antwerp, topic, registration4
sandervandessel.beMy name is Sander Van Dessel and I am 22 years old. I am a first year student of Cyber Security Professional @home at Howest.student cyber, cyber security, cloud cyber, cisco cyber, cyber opinternship, research, device, sweden, packet4
securix.beProtect your business from cyber threats with our expert network and security solutions. Our team provides top-notch services including firewalls, intrusion detection, VPN, and encryption to ensure your network is secure and your data remains confidentialbusiness cyber, cyber threatnetwork, secure, threat, encryption, confidential4
sanderbo.beI am studying for a Bachelor's Degree in Applied Informatics - Computer & Cyber Crime Professional. I gain insight into the specific problems in the field of security and learns how to arm yourself against it. As a Computer & cyber crime Professional, I'm trained in the latest technologies and…computer cyber, cyber crime, belgian cyber, cyber security, info cyberforensic, ethical, skills, degree, certified4
siriuslegaladvocaten.beDigital start-ups AI and blockchain Web & app & software development Cyber security E-commercedevelopment cyber, cyber securitylegal, law, firm, entrepreneurship, advertising4
zerobit.beHeeft u andere noden? ZeroBit is uw contactpunt voor alle Cyber Security problemen. Aarzel niet om ons te contacteren!relevante cyber, cyber security, alle cyberbit, director, awareness, follow4
corelan.beCorelan Cyber Security Research Exploit Development Tutorials Training Infosec Training corelanc0d3rcorelan cyber, cyber securityexploit, research, class, write, available4
dietervandenbroeck.beDieter Vandenbroeck on data breach , cyber attack , incident response , crisis management |impact cyber, cyber attack, breach cyberattack, domain, awareness, trust, disclosure4
aott.beAOTT brings together experts that can help you with your cyber resilience or project management needs.state cyber, cyber resilience, new cyber, expert cybersociety, value, pragmatic, resilience, success3
achillex.beAre you (re)building your application or rolling out your infrastructure? We can help you improve your cyber security posture by designing a secure architecture that takes into account all your functional and non-functional requirements. We work in close collaboration with your developers and…infrastructure cyber, cyber security, project cyber, cyber strategy, international cyberorganization, threat, infrastructure, risk, landscape3
actiotec.beAn efficient and eager to learn Cyber Security Consultant, I have over 10 years of experience, in vast and challenging projects, acquired a wide range of skills in cyber security, project management and technical domains.speciality cyber, cyber security, eager cyber, skills cybergoal, size, numerous, strategy, matter3
behindcloseddoors.beWith the world moving towards digitization and everything becoming more connected, Cyber Security has become a major concern for everyone.resiliency cyber, cyber unpredictable, connect cyber, cyber security, experience cyberprogram, registration, surround, edition, root3
torbencapiau.beAs my second part of this write-up series, I will cover two relative small challenges that appeared in the qualifiers round of this year’s Cyber Security Challenge Belgium. Compile Online The idea was simple: someone had made an online C compiler, which could be used by sending C code to the…year cyber, cyber securitywrite, march, author, challenge, conference3
spinae.beWe prefer to stay anonymous. We gave Spinae the mandate to break into our systems and show what a real cyber attack could potentially do. And they delivered! Our CEO hesitated to leave on holiday because of all the discovered security problems. Spinae helped us to prioritize the actions to resolve…real cyber, cyber attack, spinae cyber, cyber securityassessment, guidance, network, mri, manage3
sopane.beSOPANE is Advisory Partner and Management Consulting organization with Expertise in Cyber Information Security, Business continuity, Process Improvement, Risk Management and IT Strategy Consulting.expertise cyber, cyber information, assessment cyber, cyber security, transformation cyberconsulting, learn, risk, advisory, compliance3
rafu.beA2i PMO office of Bangladesh awarded my talent to secure 30,000 national websites from cyber threats. I was working on this project as a third party to defense the Cyber Attacks from the Anonymous Activities and secure critical network threats. For this Achievement government of Bangladesh awarded…website cyber, cyber threat, party cyber, cyber attacknetwork, skills, designer, speed, address2
zandrowallaert.beCurrently studying IT (Computer & Cyber Crime Professional). Creative and open minded, always looking for a new challenge!computer cyber, cyber crimeeducation, skills, sql, card, creative2
identityfraud.be► Provide insights in Red Flags and to learn more about the basics of cyber -and email security.basic cyber, cyber emailfraud, identity, domain, employee, step2
tapehissengineering.be4 th Place - Team Accidental Brute Force - Online Qualifiers Belgian Cyber Security Challenge 2020, Nvisiobelgian cyber, cyber securityengineer, groundbreaking, skills, devops, sound2
bennyvandenmeulengracht-vrancx.beDistinctive about Benny Van den Meulengracht-Vrancx’ Slices of life series is the materialization of the digital. Taking the intangible, virtual elements and characters from cyber worlds and subsequently pouring them into a physical state and placing them in a different reality and context with…character cyber, cyber world, bridge cyber, cyber cultureantwerp, paper, exhibition, gallery, space2
securojourno.beSecuroJourno creates awareness about cyber security, privacy and encryption on the basis of workshops, consultancy and articles. I strive to be the first point of contact around these themes, for people from the journalistic world and beyond.workshop cyber, cyber security, awareness cyberpractical, encryption, tailor, custom, aware2
robicue.beWe are experienced in the field of cyber security. Some of us have been ethical hackers in the past or know how hackers think. In every line of code that we write, we try to maximize security to protect your assets and your privacy .field cyber, cyber securitysecure, specialization, innovation, expensive, easy2
shapemobile.beAre you protected against a mobile cyber attack? Shape customers enjoy the Lookout App for free and are protected against malware, theft and loss!mobile cyber, cyber attackshape, fix, reference, certified, telephony2
kieranclaessens.beA while ago I participated in the so called Belgian cyber security challenge which offers a CTF full of realistic cyber security challenges. In this blog post I describe how I solved two of the hardest ( and most realistic ) web challenges this CTF had to offer.belgian cyber, cyber security, realistic cyberhacking, story, authentication, bug, challenge2
arnevanderstraeten.beI graduated as a Computer & Cyber Crime Professional, a bachelors degree in the Applied Computer Sciences, from the Howest University in Bruges (Belgium).computer cyber, cyber crimebruges, friend, infrastructure, thing, degree2
group-k.beWe believe we can make a difference by adopting our cyber security defense plan to known and unknown attack vectors by thinking out of the box. We are using the power of the cloud to analyze potential threats and coordinate potential service improvements by working together with our partners and…data cyber, cyber space, difference cyber, cyber securityconnectivity, trust, month, category, plugin2
axians.beOiltanking is one of the largest independent operators of tank terminals for oils, chemicals and gases worldwide. They asked for a network security assessment to be done to understand their exposure to a potential cyber event.potential cyber, cyber event, cyber securityindustry, audiovisual, process, learn, education2
safepoint.beWe are an inclusive Belgian cyber security company who aim to provide top quality services for our customers while helping our staff reaching the top of their potentialteam cyber, cyber security, belgian cyberawareness, career, response, industry, forensic2
emmera.beCybersecurity is really our DNA ! We developed a range of security services in order to meet the new demand for combating the modern threats enterprises face today. Here is an overview of some services we provide in cybersecurity (cyber security). Check for more details and don’t hesitate to…cybersecurity cyber, cyber securityciso, risk, awareness, range, wide2
tissad.beAt the same time numerous solutions are offered to mitigate one or more of the cyber threats and to organize the cybersecurity management. However, before directly deep-diving in solutions it is better to holistically understand the real current cybersecurity posture and to have a plan that…unexpectedly cyber, cyber incident, solution cyber, cyber threatindustrial, technology, operational, advisory, resilience2
bruthausgallery.beHer artistic research is inspired by folklore, religious iconography and cyber-culture, she often draws references from them. She conscientiously investigates the history of locations and places, interweaving the stories of the present, the past, and an imagined future. Combining elements of…iconography cyber, cyber culturegallery, exhibition, artist, contemporary, current1
evilwan.be…site is not intended to educate the audience in all sorts of dangers that lie waiting on the worldwide network tubes, but rather to show random musings that are more or less related to cyber security. Topics may include forensic techniques, reverse engineering thoughts, cryptographic protocols,...related cyber, cyber securityevil, file, java, network, reverse1
thewinningbrief.beAs a service provider to the legal sector, we are bound by a duty of non-disclosure to all our clients. We ensure that proper security is in place at all times concerning the electronic transmission and storage of documents. We are also insured for what we do professionally and also for cyber risks.professionally cyber, cyber risklegal, plain, win, translation, law1
hutix.beSecurity and risk management are key components of your defence system to guard and protect your infrastructure from breaches and cyber attacks. HUTIX has a wide variety of security and risk management engineers to secure your infrastructure and build a shield around your organisation.breach cyber, cyber attacksme, infrastructure, dynamic, operation, value1
techdatasecurity.beNow is the perfect time to monetize the opportunity in the cybersecurity space. Backed by a team of dedicated security consultants, Tech Data has the expertise and resources you need to grow a reputable security practice. Together, let’s expand your security margins across the cyber threat…margin cyber, cyber threattech, answer, challenge, endpoint, network1
eitciorg.webhosting.be…domains of science and technology, including among others physical foundations of information processing, information and communication theory, cyber security, quantum computation and communication, artificial intelligence, neural sciences and the fundamental topological aspects of information.theory cyber, cyber securityinstitute, european, standard, competency, skills1
thesecurityfactory.beWhilst investing in cyber and software security is indispensable, this will go to waste if you don’t address the weakest links in your security chain: human behavior and human error.whilst cyber, cyber softwarefactory, hacking, password, employee1
svennd.beLinux Sysadmin and Cyber Security Professional. This blog is mainly self-documenting. May my poorly written notes help you, dear DenverCoder9!sysadmin cyber, cyber securityacl, result, note, dear, mainly1
comerio.beWhen we think about security management, we move to rapidly on to the implementation of IT solutions, like firewalls, virus scanners and other complex cyber security tools.complex cyber, cyber securityghent, ciso, process, governance, gap1
stopvingerafdruk.be…to the cost of a new eID, investments need to be made for new technology. Technical processes need to be developed – just think of that illustrious database that will keep your fingerprint for three months -, and staff need to be trained. All the while Belgium only has 14 cyber officers left.belgium cyber, cyber officerlegal, campaign, freedom, donation, choice1
safeonweb.beSafeonweb wants to quickly and accurately inform Belgian citizens and advise on cyber security high-end digital threats and online security.citizen cyber, cyber securitysafe, traffic, false, july, setting1
gingerpictures.be…Jon, being the anarchistic slacker that he is, actually doesn’t want a real job, however, he chooses the academy. He’s now training to become a cyber-agent and even though it’s against his moral convictions he’s learning how to spy on enemies and friends. At the same time Jon has to hide his newacademy cyber, cyber agentginger, picture, love, feature, young1
hybridworkplace.be…at the office, at home, in a co-working place, at a customer, etc. and increasingly use more different devices that are all connected with each other. We also log in to several private and public networks. But how do you make sure this doesn’t open the door to cyber-attacks, fraud or loss of data.door cyber, cyber attackworkplace, discover, innovative, connect, secure1
zse.beThese products also incorporate a wide variety of innovative applications in the domains of Artificial Intelligence (AI), Cyber, Virtual Reality, Laser technology and Electro-Optical imaging.ai cyber, cyber virtualtechnology, value, counter, environment, mastery1
eucar.be“EUCAR projects help to develop even safer vehicles; we are securing connected vehicles against manipulations and cyber threats; and we provide a solid knowledgebase for the safe introduction of automated driving.”manipulation cyber, cyber threatmobility, vehicle, european, innovation, research1
kyravandeneynde.beWelcome to my first blog! My name is Kyra Van Den Eynde and I am a Cyber Security student at Howest Brugge. This blog is a school project, but might be used afterwards as well. In this blog I willeynde cyber, cyber securitynetwork, march, october, hackathon, programming1
nobleprog.beSécurité Internet (131) Secure Code (30) Maitrise de la sécurité (10) Sécurité des systèmes d'nformation (Information System Security) (23) IBM QRadar (1) Gestion de la Sécurité (16) Conformité des Entreprises (7) CCSK (1) Information Security Risk (8) CRISC (1) Cyber Warfare (1) Open Source…crisc cyber, cyber warfareapache, programming, framework, computing, linux1
korbateck-delta.beIt is possible to participate in research projects in the areas of production & logistics, mathematical modeling, cyber-physical systems, big data science and Internet of Things due to our connections in industry and the academic world.modeling cyber, cyber physicalindustrial, industry, research, chain, supply1
quatuor-brussels.be…in order to comply with any legal obligation or to protect the rights, property, or safety of Befimmo, our customers, or others. This includes exchanging information with public authorities (including judicial and police authorities) in the event of, for example, a cyber security incident;example cyber, cyber securitybefimmo, floor, purpose, estate, real1
iunknown.beWindows allows a large amount of security settings to be configured, either through Group Policy, or Local Security Policy: With improved focus on cyber security in the entier ICT industry there may be a requirement to tighten these settings. This can be tricky. It’s one thing to implement a high…focus cyber, cyber securityjune, soup, slice, thing, transaction1
robinbruynseels.beDuring my three years studying for my Bachelor degree in Cloud & Cyber security, I've done a lot of projects. From studying new and interesting subjects to competing in hackathons. Here you can find all my interesting portfolio projects. U can use the buttons above the pictures to filter on what…cloud cyber, cyber securityinternship, hackathon, picture, ctf, person1
sambuyens.beHi, my name is Sam Buyens and I am a Cyber Security student at Howest in Bruges, Belgium. This site is about everything that interests me :)buyens cyber, cyber securitybruges, future1
michielvanreybrouckportfolio.beHi! My name is Michiel Vanreybrouck, I'm a student Applied Informatics at the University College of Ghent. My main interests are: cyber-security, networking, programming.interest cyber, cyber securitywaiter, informatics, apply, ghent, university1
lenovothinkbook.beYour workers expect to be able to work from anywhere and to get to the company data. The protection of their identity and your data is a critical factor in this new way of working. There are new cyber threats every day. Anticipating and responding to them appropriately is not straightforward for…new cyber, cyber threatworker, technology, workplace, able, device1
thomasvdm.beHello, my name is Thomas, I'm 28 years old and live in Ghent & Blankenberge. I graduated in February 2016 as an Industrial Engineer (Master of Science) in Multimedia and Information Technologies: Cloud Computing from Ugent Campus Kortrijk. Since December 2018 working for Deloitte in the Cyber Risk…deloitte cyber, cyber riskprogress, sure, computing, risk, science1
zaereph.beHi, I’m Ewout Staelens , student in Applied Informatics – Cyber Security Profesional and the creator of this site. On this site you will find all the info you need to know about me. What I did, what I do and what I want to do in the future.informatics cyber, cyber securitycourse, future, past, interest, informatics1
mohamedmachaleh.beOkay. Enough of bad rhymes and more about me- I'm a senior studying at Odisee University College. I'm passionate about technology, especially Cyber Security and Software Development !especially cyber, cyber securityespecially, technology, passionate, okay, university1
pideeco.beCompanies must adapt their cyber security program to anticipate risks and to be able to detect incidents and quick respo...company cyber, cyber securitycompliance, risk, regulatory, financial, standard1
resilientsecurity.beOver half of Belgian companies already fell victim to cybercrime, resulting in leaked trade secrets, production lines grinding to a halt and millions of euros in lost revenue. Is your company able to withstand a cyber-attack? Are you sure?able cyber, cyber attackresilient, threat, risk, plugin, category1
antwerp-slitter.beToday, we would like to inform you of the progress we are making after the cyber-attack that occurred at the end of June. We continue to work vigorously in reinstating operating procedures and are well on our way to achieving this. Currently, the Knauf Group is making good time in restorations…progress cyber, cyber attackantwerp, slit, coil, ceiling, material1
clew.beCyber attacks hit businesses every day. There are two types of companies: those that have been hacked, and those who don’t yet know they have been hacked.connect, technology, need, network, exchange1
mikeandbecky.be…systems and website technology, and (4) provide law enforcement authorities with the information necessary for criminal prosecution in case of a cyber-attack. Therefore, the JUMBB sprl analyzes anonymously collected data and information statistically, with the aim of increasing the data…case cyber, cyber attacksubject, processing, chocolate, bean, shall1
desertcart.beYou can easily buy online and also benefit from various online sales, offers, discounts, and promotions for festivals and special days like Black Friday, White Friday, Cyber Monday, etc. desertcart provides the best online shopping offers and discounts all around the year.friday cyber, cyber mondayhealth, electronic, items, delivery, fast1
thibautdelaere.beI have a bachelors degree in applied computer sciences from Howest University College, with a specialization in “Computer & Cyber Crime Professional”. While I have a comprehensive IT background, my emphasis is mainly on cybersecurity. This doesn’t mean that I don’t enjoy programming.computer cyber, cyber crimeinteresting, strategy, qa, remote, effective1
bodin.beData theft, cyber criminals, malware, hackers and viruses. All risks that you want to be miles away from you and your business. Network security has become a necessity, on both your hardware and the software that makes your network available. How secure is your data?theft cyber, cyber criminalnetwork, secure, engine, learn, package1
cybersecurity-law.beFranck is also researcher in data protection and cybersecurity law at the Cyber and Data Security Lab (CDSL), which is part of the internationally renowned Research Group on Law, Science, Technology & Society (LSTS) at the Faculty of Law and Criminology of Vrije Universiteit Brussel (VUB).law cyber, cyber datalaw, external, officer, advice, compliance1
dnmatchit.be…and CRM & Customer Experience services. Closer to home, our Belgian practice consistently ranks number one for a myriad of services, including cyber security. If that’s not enough, the breadth of our offering reaches far and wide spanning many international projects across multicultural teams…service cyber, cyber securityambitious, network, technology, fair, approach1
jeromedewulf.beI'm a no nonsense problem solver from Antwerp currently working as a Cyber Physical Systems Engineer at Atlas Copco. I have professional experience with React, React-native, Angular and Wordpress.currently cyber, cyber physicaldeveloper, antwerp, react, native, angular1
pentaquark.beWe can protect computers, networks, software, and data. Cyber-attacks are performed to make unauthorized access, change or destroy data, or to extort the money. We help you protect your systems and data from unauthorized accessdata cyber, cyber attacktrust, highly, united, network, enterprise1
proximusnxt.beProximus NXT is not just a brand, but primarily an ecosystem of specialised affiliates and local partners. Their goal? To help you manage the complexity of ICT and take advantage of new technologies in cloud, data or cyber security.data cyber, cyber securityproximus, organization, range, forward, wide1
selimamalsagova.beI am managing a cyber Community orbiting around literature since 2013 when it was created. Over the years, the community became quite active which encouraged me to work on an app project for writers (still ongoing).edit, dress, story, wedding, strategy1
promelec.bePromElec offers unbeatable Broadband Internet connectivity via Satellite across Africa. Our customers include Internet Service Providers, Educational and Health establishments, Calling Card Platforms, the Corporate Sector, Remote Military installations & Cyber Cafes. We can provide complete…installation cyber, cyber cafeafrica, wireless, broadband, distributor, official1
iot-solutions-accelerator.beNVISO exclusively focuses on cyber security services with an extensive expertise in security-critical industries like financial services, government and defense and the technology sector.exclusively cyber, cyber securityiot, accelerator, innovation, technology, program1
ada-solutions.beWhether if you’re on a PERSONAL COMPUTER or notebook, protection software may also help protect you from cyber criminals. It also will let you keep your sensitive information safe from on line scammers. Thankfully, there are plenty of free security software choices. Avira No cost Security is a…software cyber, cyber criminaluncategorized, leave, features, technology, secure1
lowiehooybergs.beBack it up! There are many risks involved in running a website. You have to take everything into account. Without precautions, your website is vulnerable to hackers, cyber attacks and even loss of data. No matter how secure your website is, you can always fall...hacker cyber, cyber attackplugin, advanced, secure, slider, fast1
centexbel.beIndustry 4.0 refers to the advanced integration of products and processes via digital technology. It refers to cyber-physical systems (CPS). We can define Industry 4.0 as the next phase in the digitisation of the manufacturing industry, driven by technological developments.technology cyber, cyber physicalghent, processing, researcher, melt1
hostpapa.beCDNs not only help the stability of your website by distributing the traffic among different servers, they can also help to prevent cyber attacks. If a hacker tries to gain access to the cached version of the website from the server closest to them, your original content will remain untouched…server cyber, cyber attackdomain, features, fast, reliable, network1
f20.beOne of your clients has been hacked by the Carpe Diem cyber gang and all their important files have been encrypted. They have hired you to help them recover an important file that they need to restore their backups. They have contacted the carpe diem cybergang and paid a ransom but have not heard…diem cyber, cyber gangvulnerable, fugit, tempus, vmware, story1
police-hackathon.beforensics and stegonagraphy challenges on the platform which are exactly what the FCCU does. Besides serving these individuals that are skilled in cyber security on a silver platter. The FCCU could also use this as a part of their recruitment process. Now there’s only a written, theoretical exam…skilled cyber, cyber securityhackathon, federal, challenge, innovative, chief1
nickfoulonit.beI am a cyber fanatic. Hacking, defending, .. I’ve had quite some experience on the wild web. Choose a partner that you can trust.need, custom, story, stuff, technical1
ghitti.be…are the project management, Python, PHP, AI, data science, blockchain, healthcare and innovation. I have a very good contact with other ITs, clients or end-users. To stay up to date ( yes, I'm curious ), I invest numerous hours researching and learning technologies that best fit the task at work.technology, scrum, scientist, python, innovation0
experis.beExperis partners with clients undertaking these implementations to understand their challenges, their aims and the skills that will ensure success. From project management and functional support analysis, to the architecture and software development, we will power your enterprise applications with…cyber securityenterprise, career, accelerator, resourcing, consulting0
callens.beCallens, Pirenne, Theunissen & C° is an audit and accountancy firm that has occupied a prominent place in the top 10 Belgian firms since 1936. We offer broad technical expertise and deep local market knowledge in audit, tax, accounting, IT services, risk management and corporate finance…firm, corporate, risk, accounting, tax0
spellenboom.beSpellenboom webshop has a strong focus on Collectable and Tradable Card Games. Also Miniatures, Living Card Games, RPG and Board Games.space cyber, cyber stationshield, star, card, deck, realm0
vapenews.beHere comes the good news that GeekVape released its new product: GeekVape Obelisk 120 FC Z Kit. It’s the World’s First Vape with Safe Fast…smok, choice, powerful, august, july0
afarax.beWe offer our clients and consultants a qualitative approach to their search of expertise. We connect people with the right expertise and fulfill complex projects.consulting, challenge, click, strategy, approach0
apconsulting.beAP Consulting is a thriving company aiming to enrich its customers by offering a complete bundle of ICT services.secure cyber, cyber threatconsulting, computing, voice, network, infrastructure0
betfirstcasino.beCasino Online gaming is one of Belgium’s most popular pastimes (so popular in fact, it’s practically a national sport!) And there’s one place that every casino online gamer - both newbies and seasoned players - will want to head: betFIRST Casino. Our casino has an extensive range of fun…exclusive, card, selection, favourite, player0
cresco.beOur main strength is our ethical hacking background. We replicate hacker’s methods to have a realistic vision on the maturity of your security systems in order to set-up an adequate security plan to better protect your business.hacker cyber, cyber expertmaturity, ethical, approach, hacking, assessment0
jato.beOver 24 years in the ICT Industry. Specializing in ICT management and a wide area of ICT systems.skills, response, education, reference, industry0
prodata-systems.beProdata Systems is a Belgian IT integrator that has been managing complex and business critical environments for many years. We guarantee optimal flexibility in meeting your most demanding requirements, and by partnering with state of the art vendors we ensure continuity and security of your IT…cyber securitynetwork, assessment, vulnerability, networking, demand0
antoineblairon.beI’m convinced that team spirit is a key point to successfuly deliver a project. I love to learn from colleagues.cyber securityskills, profile, infrastructure, network, electronic0
cyberguardians.beHome… Cyber Security… Contact… Cyber…cyber guardian, cyber securityguardian0
asca-it.beHome… About us…computer cyber, cyber crime0
bergspace.beDigital Marketing solutions from Bergspace could help us overcome negative impact of COVID19 restrictions. We are now able make all orders via internet, our business is back vital again.cyber securityenterprise, technology, automation, consulting, productivity0
inelmatec.beDownload the latest Inelmatec catalogcyber securitycontrol, energy, temperature, transducer, current0
cybersec.beCookie Policy…risk0
ista-webportal.beCurrently, we do not yet know what data the attackers obtained or what data has been accessed. All current information on the current status of the investigation and answers to the most important questions can be found here, which we are continuously updating, as soon as new information arises.external cyber, cyber attackpassword, currently, manual, profile, external0
ertms.beERTMS is an abbreviation of European Rail Traffic Management System. ERTMS consists of ETCS (European Train Control System), GSM-R (a radio-based communication system for rail) and ETML (European Traffic Management Layer, providing information about the location of trains on the network). The…cyber securitynetwork, deployment, automatic, operation, issue0
liamremmerie.beBy pure chance, I stumbled across a small introductory course to Apache Cassandra that was held the 11th of August by DataStax. Even though I had already worked with Cassandra during my internship, the exact workings of it remained quite strange to me, so I decided to follow the course. Like often…uncategorized cyber, cyber securityuncategorized, apache, future, august, course0
planetairsoft.beHoofdmenu / tactical gear / gun bags & cases / tactical belts / protective gear / pouches / zichtbaarheid / glasses & goggles / holsters / slings / plate carriers / tactical vests / helmet / communicatie / hydratatie / flashlights / trainings messen / patches / camouflagerifle, tactical, internal, gear, sniper0
lvr-consulting.be…neque vitae tempus quam pellentesque nec. Fames ac turpis egestas maecenas pharetra convallis posuere. Risus pretium quam vulputate dignissim suspendisse. Sit amet nisl purus in mollis nunc. Nibh sit amet commodo nulla facilisi nullam vehicula. Elementum sagittis vitae et leo duis ut diam quam.compliance cyber, cyber attackdiam, consulting, odio, quam, elementum0
mattibijnens.beMainly active on the Intigriti platform. Currently all-time #1 for high-critical severity (leaderboard) .computer cyber, cyber crimebug, vulnerability, critical, currently, researcher0
kappadata.beAre you looking for network infrastructure, security and IoT solutions for your company or customers? Welcome to Kappa Data, your value-added distributor for IT.network, iot, value, distributor, request0
xmconsulting.beEnrich internal data and log files with threat intelligence feeds in order to better detect security incidents.company cyber, cyber securitythreat, asset, learn, remediation, file0
bitsnip.beAbout… Contact… Privacy Policy… Install Linux software with Jumpcloud… Securing Windows with Jumpcloud…thing cyber, cyber worldindex, linux, setting, mistake, pfsense0
ideca.beIdeca provides management services for mid-sized and big companies, as well as a set of other services:privacy cyber, cyber securityadvice, specific, permission, program, sized0
vulpoint.beChallenges to solve : making a link between ICT guys and the top management, explain Risks and Technologies to the Board, transmit vision and strategy to the ICT guys.services cyber, cyber risk, cyber securityrisk, law, implementation, infrastructure, process0
jonaslibbrecht.beOpenStack automated orchestration, integration testing & automated stability testing based on OpenStack RHEL & Cisco ACI + N7Knetworking cyber, cyber securitylinux, simplicity, complexity, automation, ansible0
aboutit.beAbout IT provides IT support and IT management to small businesses in Brussels. Enjoy our full-time helpdesk, process optimization, cloud migrations and more.status cyber, cyber securityoptimization, process, technology, reliable, offer0
virtualidentity.beSelf-sovereign identity is an approach to digital identity that gives individuals control of their digital identities. SSI addresses the difficulty of establishing trust in an interaction. In order to be trusted, one party in an interaction will present credentials to the other parties, and those…identity, virtual, technology, reality, artificial0
legalstaffingexperts.beOur Academy ensures that our legal experts are on top of the latest legal developments and best-in-class in terms of project management and digital solutions.legal, flexible, recruit, need, compliance0
antwerpmanagementschool.beAs an excellent management school, we want to remain at the forefront of business innovation and transformation. Thanks to our extensive research team, we stay on top of business science, management and organization. We do this by both creating new knowledge through research and bringing about…risk cyber, cyber securityantwerp, program, leadership, estate, real0
wittebol.beI'm Pieter Wittebol, 31 years old and working as a certified Red Hat administrator in the IT industry.cyber securitytechnical, infrastructure, network, language, skills0
encos.beENCOS provides professional advice in Industrial Automation, We have a thorough knowledge of Siemens Automation.automation, industrial, industry, knowledge, computing0
7hill.beDiscover 7HiLL, a dynamic and results-driven services company in information & communications technology (ICT) that listens to YOUR real business needs first!cyber attacktechnology, learn, enterprise, result, strategic0
cyberfactory.beDiscover our selection of high quality mega events, raves and festivals in Belgium, Netherlands and Germany.factory, picture, rave, electronic, music0
robinwalraevens.beI am a motivated student with a great passion for everyone that comes in mind when mentioning IT.computer cyber, cyber crimeview, past, mind, motivate, creative0
artdev.beDrive better business outcomes from your data with our big data, advanced analytics, and fully managed Analytics-as-a-Service platform.cyber securityfuture, apply, infrastructure, value, corporate0
diceladbrokes.be…you want for your winning combination to try and win the Bonus or Mystery. You don’t just need a good playing and analysis technique to put the dice in the order that will allow you to win. Interact with the game by placing dice lines in 4 different boxes to achieve the best possible combination.cyber numberplay, combination, win, colour, popular0
hkstrategies.beH+K STRATEGIES delivers deep sector knowledge and a breadth of public relations expertise which enable us to solve complex communications challenges for our clients. Our ‘breadth and depth’ model allows us to bring together the best expertise and specialisms from across the industry to create…strategy, insight, reputation, virtual, growth0
cyberhate.beCyber…cyber partners0
blug.beThe term "proxy" comes from English and in free translation means "intermediary". The term "proxy server" is also found on the Internet, which we will take a closer look at. What is a proxy server? A proxy server, also known as an intermediary server, mediates the exchange of information...cyber security, fourth cyber, cyber attacktechnology, number, knowledge, inform, attack0
solarex.beWith over 10 years of experience in Solar Operations & Maintenance we offer a wide range of supporting services for O&M contractors, PV owners and EPC's.cyber securitytechnical, contractor, owner, consulting, troubleshoot0
dju.beæ·±å�³å¸�永诺æ��å½±å�¨æ��è�¡ä»½æ��é��å�¬å�¸å®�æ�¹ç½�ç«�-å�½äº§é�ªå��ç�¯-LEDæ��å½±ç�¯-é�ªå��ç�¯è§¦å��å�¨-å®�æ�¶å¿«é�¨çº¿-æ� çº¿é�¥æ�§å¿«é�¨çº¿-YONGNUO, photographic photographic equipment, equipment, camera camera accessories, accessories, flash flash light, light, camera camera remote remote…armitage cyber, cyber attack, defencie cyber, cyber puzelphotography, light, photographer, lightroom, overflow0
montauk.beMontauk is a Belgian company on a human scale. It offers services to national and European institutions as well as to the private sector. Montauk supplies high-quality, flexible and innovative technical solutions for your conferences, congresses, seminars, online meetings and webinars.cyber securityconference, european, network, meeting, technical0
mmshop.beNews… Services… Contact… Promo sur les produits Dragon Ball cette semaine !… Splatoon 3 est arrivé…duty, midnight, picture, dark, need0
airdice.beAir Dice provides gaming operators with slot games as well as strategic skill-influenced money games. From sounds and graphics to presentation to game interaction, our offering gives the player a deeper immersion into the game. All of our games are provided as fully hosted applications under…learn, ball, win, money, player0
nomios.beManaged network services Enhance your availability and reduce costs with managed services that simplify and automate your networks.cyber security, frontline cybernetwork, secure, networking, enterprise, technology0
lines.be…Climate change – could my warming cellar warn of a future struggle for survival?… Air pollution –…climate, emergency, future, change, struggle0
cryptona.beBecause Technologies who are crazy enough to think that they can change your world , are the ones who docryptographic cyber, cyber security, late cyberipsum, sit, elit, dolor, amet0
cyberdigital.beNecessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.cyber security, data cyberofficial, future, technology, tech, smb0
hact.beThe IT security landscape is evolving constantly and attackers are more and more into the human aspects. This is why we need to boost our defense by focusing on the human and teaching people how to react. Our security awareness program teaches employees how to behave securely both at work and at…awareness cyber, cyber threathuman, awareness, threat, technical, topic0
amharctech.beAmharc Tech can help create a custom website that fits your needs. If you are looking to enter the e-commerce space or even just revamp your website, Amharc Tech has web development solutions for you.cyber securitytech, book, optimization, engine, custom0
redrobot.beFirst of all, what we can do is analyse the actual need for blockchain integration. Secondly we assist in designing an implementation track & the required software architecture. Finally, we can manage the project from start to finish and implement a solution.cyber security, expert cybercompliance, need, technical, technology, actual0
smitt.beSMITT BV or Support & Manage IT Technology is a knowledge company specialized in advising, implementing and delivering enterprise systems management solutions for ICT operations.sidebar, dynamic, pricing, button, process0
awarity.bePhysical pentests External pentests Wi-Fi pentests Internal pentests Awareness training Awareness team buildings Phishing campaignsawareness, external, internal, appointment, physical0
isaca.beHere at ISACA Belgium we are dedicated to providing education, workshops and regular meetings to help promote and elevate the IS audit, control and securitybelgium cyber, cyber securitychapter, member, board, calendar, benefit0
e-genium.beThe various services to our customers ask important knowledge in information technology. That's why e-Genium has an expertise mastering these technologies. e-Genium will also accompany you in developing your project by setting up a development methodology and procedures for monitoring and…cyber securitytechnology, process, onepage, benefit, french0
icator.beICATOR is launching an international campaign to file a class action lawsuit against neuro torture. Many people worldwide are affected by secret torture programs and clandestine research with neuro weapons. We are the first Human Rights organisation worldwide to raise money to take legal action…synopsis cyber, cyber torturemind, control, member, frequency, electronic0
siebevervoort.beI'm Siebe Vervoort. A cybersecurity student and enhousiast. I'm a very adventurous person, who is always up for a challenge!inspiratiesessie cyber, cyber securitycertified, ethical, ctf, challenge, ceh0
larsveelaert.beDesign your systems to lower data and network risk, improve security, and enable innovation and growth.ipsum, sit, consectetur, amet, dolor0
kalypsico.beKalypsico integrates hardware, software, consulting and ICT services into engineered business solutions that work together in the cloud and in your datacenterscyber securityconsulting, strategy, implementation, technology, premise0
ryande.be~$ryande – Cyber Security Studentlaatstejaarstudent cyber, cyber security0
trianglepartners.beAbout… Our commitment… Our Insurance solutions… Professional Indemnity & Combined General Liability…cyber insuranceinsurance, liability, transit, comprehensive, aviation0
licentie2go.be…and products that secure your digital world are available in our store. In addition; we are Microsoft Silver partner to provide you with 100% legitimate Microsoft Office- and Windows license keys. Another fun product to look at is our Adobe assortment for Photoshop photo-editing or Adobe Premierecyber protectionadobe, device, operate, guarantee, premiere0
wpms.beOur team of experienced and technically skilled engineers are highly motivated and committed to your project(s). WPMS covers the complete project life cycle for your instrumentation & controls, information technology (IT), electrical or multidisciplinary projects and is your partner for successful…cyber securityconsultancyworldwide, subcontractor, risk, technical, learn0
s-connect.beWelcome to S-CONNECT - Components for Solutionsindustrial cyber, cyber securityindustrial, device, connect, extender, embedded0
vcts.be2015: Creating strategies for technology investment companies, building growth strategies, linking Europe with the Middle East & Asia, fundraising for tech companiesspoc cyber, cyber securitystrategy, technology, growth, program, asia0
bats.beBATS provides global, integrated solutions combining a wide range of sensors such as thermographic cameras , surveillance radars , anti-drone radar , tactical air defense radars , coastal surveillance radars , COMINT systems , seismic sensors, and C4 etc. All our solutions are designed to work in…cyber security, end cyberhomeland, advanced, technology, defence, tactical0
arpia.beDevelopment of various tools to help in managing compliance with the General Data Protection Regulation (GDPR), such as (i) a Data Transfer Impact Assessment (DTIA) tool, (ii) a GDPR role assessment tool, (iii) a Data Protection Impact Assessment (DPIA) tool, (iv) a data breach severity assessment…data cyber, cyber techlegal, lawyer, law, assessment, interest0
digitribe.beWe leverage community knowledge and expertise to deliver innovative and sustainable business solutions to customers.cyber security, cloud cybertribe, consulting, result, incubator, innovative0
cyberevent.beEvent 2020…aware, secure, awareness, step, result0
diforex.beWe provide quality advice and expertise in Digital Forensic Investigations on any type of investigation and data source. We also work as a court expertforensic, analysis, advice, imaging, awareness0
security-people.beSecurity People is a privately owned Cybersecurity Support and Services business formed in 2019. Today we’re proud to boast a strong team of Experts who thrive on rolling up their sleeves and solving your IT problems and meeting your business needs.cyber securitytechnology, healthcare, manufacture, industry, learn0
astriva.beTypographic postersPrint DesignView Project… Logo DefensiePrint Design, Digital DesignView Project…view, birth, announcement, corporate, typographic0
ae.bewith digital transformation, architecture and PMO, innovative design systems, user research, critical infrastructure, becoming more agile and nimble, viable data products, digital customer experiencedevops cyber, cyber securityorganization, learn, agile, algorithm, adaptive0
charlesjacquet.beContact…cyber securesecure0
havoconsulting.be“ I came in contact with HAVO through the recommendation of my colleague. Ever since we started collaborating a business level, HAVO has proven to be an excellent business partner by providing me with prompt and tailor-made solutions for each of my demands. HAVO lives by the words "do what you…cyber securityconsulting, engineer, network, need, functional0
marquee.beAbout… Contact… Privacy…cyber security, organization cyber, cyber resiliencetab, items, resilience, organization, need0
mysec.beAbout…bv cyber, cyber security0
myline.beExcept for some plants or characters, everything you'll see in this gallery has been modeled by me using several modeling tools :gallery, industrial, modeling, intellectual, river0
dv2.beStrong partnerships developed through exclusive distribution with meticulously selected brands according to their complementarity, technical excellence, top-quality and strong potential of development.series, install, modular, power, rack0
foxandfish.beOver 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.checkbox, month, plugin, category, duration0
cyber-security.beServices… News… About us… Contact Us… Home… Site map… Events… Company Profile… Vision & Mission… Learn…home cyber, cyber securityprofile, learn, advice, click, heart0
ofep.beOFEP is a company established in Brussels and created in 1981. The company is active in multiple domains including IT, telecommunications and also legal and financial advice. Customers of OFEP are working in different industries including financial and insurance sector, automotive industry…financial, legal, consulting, candidate, network0
vandyckyorben.be12. Once logged in there will be a line at the top of the command prompt saying: “Use http: (ip address)” go to your web bowser and type this in.inside, virtual, root, password, command0
keysec360.beWe scan up to 20 external public IP addresses every month to discover new vulnerabilities, open ports and security issues. Issues will be reviewed and reported monthly.cyber securityvulnerability, package, continuous, endpoint, device0
smbexpress.beSMB Partner Community - Vendors & Promotions - Pivot your business - Discover our incentives - Check out our trusted advisorsvendor, advisor, smb, trust, asset0
cqre.beIn 2016, a Belgian bank suffered 70 Mio EUR of damages attributable to social engineering.corporate cyber, cyber attack, centre cyber, cyber securitypassword, belgians, damage, problem, employee0
martijnluyckx.beI am a Security Analyst at Intigriti , with a Master’s degree in Computer Science from Hasselt University . Aside from that, I am owner and full stack web developer at CKX . There, I allow SMEs to reach their customers online through modern websites and strong copy. When I'm not working, you can…cyber securitything, secure, analyst, french, dutch0
induver.beWe detect potential risks and provide a global prevention policy adapted to the company in which you operate.risk, employee, family, analysis, prevention0