netdiensten.be | Trust our robust cybersecurity solutions to safeguard your digital assets, ensuring resilience against evolving threats and maintaining the highest standards of protection. | optimization cybersecurity, cybersecurity solution, cybersecurity excellence, robust cybersecurity | efficiency, file, seamless, robust, threat | 34 |
cybersecurity-research.be | Flanders delivers excellent academic research in cybersecurity. With the Cybersecurity Initiative Flanders the government boosts this research capability, facilitates the transfer of knowhow to society and industry, and supports the knowledge transfer through training, outreach and communication… | cybersecurity research, flemish cybersecurity, cybersecurity program, research cybersecurity, cybersecurity initiative | research, flander, track, security, secure | 25 |
cyberinit.be | CyberInIT, your trusted cybersecurity partner in Wallonia, centered around Liege. We offer expert security audits, vulnerability scans, penetration tests, and training programs. Safeguard your business against cyber threats with our proactive cybersecurity services. | cyberinit cybersecurity, cybersecurity partner, proactive cybersecurity, cybersecurity service, cybersecurity safety | vulnerability, security, wallonia, threat, program | 25 |
cybersecurity-law.be | Cybersecurity-Law is an external Data Protection Officer service for small and bigger companies. As self-employed consultant, Franck Dumortier provides expert advice on privacy, data protection law and GDPR compliance. | protection cybersecurity, cybersecurity law, cybersecurity proactive, nis cybersecurity, cybersecurity act | law, gdpr, external, advice, officer | 24 |
spinae.be | Searching for a specialist in OT security, we were referred to Spinae. We immediately felt that they know a lot about cybersecurity and about Industrial Control Systems, and that is exactly the mix we needed. | spinae cybersecurity, cybersecurity ot, field cybersecurity, possible cybersecurity, cybersecurity risk | security, ot, guidance, penetration, manage | 24 |
cresco.be | Our team of cyber experts is ready to take your cybersecurity to the next level. Our greatest asset is our background in ethical hacking. We thoroughly examine your systems, just like real hackers would. This provides you with a realistic assessment of the maturity of your security systems. Based… | cybersecurity assessment, ready cybersecurity, cybersecurity level, year cybersecurity, cybersecurity experience | security, assessment, approach, penetration, red | 18 |
alter-solutions.be | IT Outsourcing and consulting services for Software development, Cybersecurity and Cloud Computing. Nearshore team delivery | development cybersecurity, cybersecurity cloud, cybersecurity management, international cybersecurity, cybersecurity consultancy | alter, outsourcing, computing, cloud, delivery | 17 |
emmera.be | Emmera offers a wide range of high qualiity services: security, cybersecurity, data protection, Audit, CISO as a Service, forensics in Belgium | emmera cybersecurity, cybersecurity security, security cybersecurity, cybersecurity datum, cybersecurity company | security, risk, ciso, awareness, range | 16 |
soteria.be | Discover the importance of cybersecurity for IT and OT systems in small and medium-sized businesses. Make use of the VLAIO guidance process with 50% reduction. | soteria cybersecurity, cybersecurity experts, importance cybersecurity, cybersecurity ot, cybersecurity audit | ot, security, size, system, guidance | 16 |
ayer.be | jaume ayerbe – CyberSecurity, Artificial Intelligence, Strategy, Inbound Marketing, Digital Transformation | ayerbe cybersecurity, cybersecurity artificial, like cybersecurity, cybersecurity blockchain, intelligence cybersecurity | artificial, strategy, uncategorized, technology, category | 15 |
cyber3lab.be | web3 research with Cyber 3 Lab. At Howest, our research unit is at the forefront of supporting you in cybersecurity and immersive technology, particularly within a decentralized AI landscape. Our team comprises highly skilled experts and young potentials, each passionately engaged in international… | forefront cybersecurity, cybersecurity immersive, realm cybersecurity, cybersecurity pronounce, ai cybersecurity | lab, security, cyber, immersive, research | 14 |
qity.be | Qity's experts provide a range of services in Quality Assurance, Regulatory Affairs, Safety Testing, Architecture & Design, Cybersecurity & Data Privacy and Usability Engineering to organizations in the biotech, medical devices, in-vitro diagnostics, digital health and pharma industries. | design cybersecurity, cybersecurity datum, embed cybersecurity, management cybersecurity, cybersecurity information | regulatory, safety, usability, testing, approach | 14 |
secwise.be | With SecWise , you embark on a strategic journey towards cybersecurity maturity . We methodically design and implement a modern security strategy , architecture , and processes tailored for your organization . | team cybersecurity, cybersecurity expert, practice cybersecurity, cybersecurity maturity, path cybersecurity | security, microsoft, cloud, azure, cyber | 14 |
uptimesecurity.be | Uptime Security utilizes the CCB Cyber Fundamental Framework , a practical, Belgian solution designed to swiftly provide clarity on your cybersecurity status. This framework allows us to work effectively with our clients, offering immediate insights into the areas of strength and vulnerability… | achievable cybersecurity, cybersecurity roadmap, compliant cybersecurity, cybersecurity posture, trust cybersecurity | security, insight, strategic, technology, approach | 14 |
acevisions.be | Ace Visions is a Belgian consulting company (est. in 2018) that offer management-consulting , cybersecurity-consulting, and interim-management services. | consulting cybersecurity, cybersecurity consulting, ace cybersecurity, visions cybersecurity, cybersecurity risk | ace, consulting, interim, network, recruitment | 14 |
skalvaro.be | Written by Mar 5, 2019 | CYBERSCOOP. Sean Lyngaas A year ago, cybersecurity researchers at Trend Micro who were tinkering with home-automation systems in their spare time decided to make a formal project out of it. One of the researchers invited the others to hack his smart home in Germany and… | global cybersecurity, cybersecurity privacy, challeneges cybersecurity, cybersecurity landscape, success cybersecurity | ago, month, security, late, network | 14 |
virtualidentity.be | AI , behaviour , cyber , cybersecurity , digital , ethics , identity , Information Technology , integrity , network , system , virtual reality | behaviour cybersecurity, cybersecurity cyberspace, blockchain cybersecurity, cybersecurity digital, cyber cybersecurity | identity, virtual, blockchain, reality, technology | 14 |
secureness.be | Secureness offers a proactive and in realtime comprehensive Vulnerability Management-as-a-Service solution to bolster your organization's cybersecurity. Our dedicated team of experts employs advanced tools and methodologies to scan, assess, and prioritize vulnerabilities across your digital… | secureness cybersecurity, cybersecurity partner, suite cybersecurity, cybersecurity solution, mind cybersecurity | vulnerability, soc, security, penetration, testing | 14 |
condaco.be | Digital transformation and innovation projects bring cybersecurity challenges. I can help you to identify the risks, select appropriate security controls and design secure solutions. | bv cybersecurity, cybersecurity architecture, solid cybersecurity, cybersecurity consulting, project cybersecurity | security, innovation, risk, secure, empower | 13 |
stark-security.be | Cybersecurity training made for SMEs. Cyber security in human language. No technical jargon, but plain language for the non-IT expert. | knowledge cybersecurity, cybersecurity computer | security, technical, employee, language, elearning | 13 |
cybereyes.be | Cybersecurity Ransomware protection pentesting antivirus camera surveillance firewall antispam emailprotection cybereyes managed services | cybereyes cybersecurity, cybersecurity framework, forward cybersecurity, cybersecurity need | technology, firewall, security, threat, safety | 12 |
mcg.be | To stay informed of MCG news, the latest innovations and our solutions in terms of cybersecurity for your company, subscribe to our newsletter! | late cybersecurity, cybersecurity trend, cybersecurity newsletter, term cybersecurity, cybersecurity company | security, cyber, threat, value, discover | 12 |
sopane.be | Cybersecurity Risk Management for OT & IoT including Industrial and Critical Infrastructures and emerging IoT initiatives enabling secure adoption of Industry 4.0 encapsulating risk management, strategic consulting and engineering support. | sap cybersecurity, cybersecurity grc, enterprise cybersecurity, cybersecurity strategy | consulting, security, risk, advisory, compliance | 11 |
tissad.be | At the same time numerous solutions are offered to mitigate one or more of the cyber threats and to organize the cybersecurity management. However, before directly deep-diving in solutions it is better to holistically understand the real current cybersecurity posture and to have a plan that… | industrial cybersecurity, cybersecurity operational, unfettered cybersecurity, cybersecurity catalyst, cybersecurity posture | industrial, technology, operational, advisory, cyber | 10 |
cybermeetup.be | Cyber Meet-Up aims to raise cybersecurity awareness, facilitate knowledge sharing and strengthen cyber resilience. | importance cybersecurity, cybersecurity unquestionable, long cybersecurity, cybersecurity short, investment cybersecurity | cyber, meet, community, venue, speaker | 10 |
cybersecuritycoalition.be | Stay tuned to the forthcoming activities of the Coalition community. Cyber Pulse keeps you up-to-date on the latest cybersecurity news, community actions and member stories. | late cybersecurity, cybersecurity news | security, cyber, member, authority, private | 9 |
dlmit.be | Hey, my name is Jonas De la Marche and I'm a cybersecurity specialist from the Ghent area. I studied System and Network Engineering and got a micro degree for Cybersecurity Specialist. | dlmit cybersecurity, marche cybersecurity, cybersecurity specialist, degree cybersecurity | penetration, system, environment, testing, network | 9 |
jarviss.be | AI systems quickly analyze and correlate huge volumes of data, making them ideal for optimizing your cybersecurity tech stack. | network cybersecurity, cybersecurity strategy, ideal cybersecurity, cybersecurity tech, approach cybersecurity | security, network, manage, approach, ot | 9 |
agoriasirris.be | Cybersecurity : Find your way in the Agoria & Sirris offerings to make your manufacturing cybersecure and to build secure and trusted digital products. | new cybersecurity, cybersecurity regulation, act cybersecurity, cybersecurity requirement, framework cybersecurity | presentation, manufacture, legal, ceo, green | 8 |
security-people.be | Security People is a privately owned Cybersecurity Support and Services business formed in 2019. Today we’re proud to boast a strong team of Experts who thrive on rolling up their sleeves and solving your IT problems and meeting your business needs. | people cybersecurity, cybersecurity partner, source cybersecurity, cybersecurity service, privately cybersecurity | security, industry, cloud, cyber, technology | 8 |
darioincalza.be | As an experienced cybersecurity and privacy professional I have a profound understanding on how to create and coach engineering teams that excel in tackling highly complex security and software engineering problems at scale. I strongly believe that cybersecurity has a big impact on creating and… | incalza cybersecurity, cybersecurity professional, experience cybersecurity, cybersecurity privacy, strongly cybersecurity | security, android, highly, problem, conference | 8 |
focalpoint-sprl.be | Cybersecurity and cyber risk management are no longer optional aspects of business operations in today's digital age. The potential threats and risks that companies face in the digital realm are growing exponentially | tips cybersecurity, cybersecurity experts, control cybersecurity, cybersecurity destiny, employee cybersecurity | cyber, security, risk, focal, advanced | 7 |
pideeco.be | What is is cybersecurity cybersecurity and and how how does does it it affect affect your your company? company? Learn Learn more more in in our our service service page. | cybersecurity company | compliance, risk, regulatory, anti, financial | 7 |
punjwani.be | Today, June 2024 - Arif PUNJWANI, Project Management Professional - Specializing in Cybersecurity | cybersecurity lead, comptia cybersecurity, cybersecurity analyst | june, today, specialize, linkedin, key | 7 |
cyber4sme.be | Are you an SME? Register for free to one of our cybersecurity workshops financed by the FPS Economy! The FPS Economy, in collaboration with Headmind Partners, is offering SMEs a unique opportunity to take part for free in cybersecurity awareness workshops. These workshops, in the form of a crisis… | free cybersecurity, cybersecurity workshop, cybersecurity awareness, company cybersecurity, cybersecurity simple | sme, cyber, game, escape, fps | 7 |
ciso-as-a-service.be | CISO as a service - we provide cyber security services (cybersecurity) and governance for all budget. Fractional (part time) Ciso - Security audit - Belgium | service cybersecurity, cybersecurity governance, cybersecurity business, assessment cybersecurity, cybersecurity posture | ciso, security, cyber, governance, program | 7 |
thebirdwing.be | Platinum package: includes all packages plus cybersecurity awareness, staff training, info about cybersecurity primes, guidance on best practices and governance frameworks. | information cybersecurity, cybersecurity solution, plus cybersecurity, cybersecurity awareness, info cybersecurity | package, innovation, silver, learn, gold | 6 |
thibautdelaere.be | In addition to his expertise in cybersecurity and AI, Thibaut De Laere is also an avid art lover, world traveler, and coffee enthusiast. Through his blog, he shares his personal experiences and insights on his adventures around the world, the latest coffee trends, and his love for art. Whether… | intersection cybersecurity, cybersecurity ai, expertise cybersecurity, topic cybersecurity, cybersecurity cybercrime | technology, late, knowledge, enthusiast, cyber | 6 |
skwaleks.be | For the school subject System Engineering & Analysis, I developed "CyberBass6000" with a fellow Student. This device is tailored to the needs of Cybersecurity teachers & the cyber classroom. This device provides the brightening of the cyber lab using music, news, radio & more. | february cybersecurity, cybersecurity department, need cybersecurity, cybersecurity teacher, twice cybersecurity | security, volunteer, responsible, network, discord | 6 |
cyber-coaching.be | Cybersecurity Coaching – How to better protect yourself and your business against sophisticated cyberattacks and ransomware | | sophisticated, toggle, theme, avada, load | 6 |
proximusnxt.be | Proximus NXT offers a wide range of telecom and ICT solutions. The main asset of Proximus NXT lies in the strength of our open ecosystem through our specialized affiliates and unique partnership agreements with hyperscalers in cloud, data and cybersecurity. Locally, our affiliates and ICT-partners… | specialist cybersecurity, cybersecurity operational, service cybersecurity, cybersecurity digital, expert cybersecurity | proximus, nxt, story, organization, range | 6 |
futurwork.be | We fortify your digital security with advanced measures. FuturWork assesses your systems and identifies vulnerabilities to implement robust cybersecurity strategies, protecting your organization from potential threats | robust cybersecurity, cybersecurity strategy | consulting, cloud, strategy, innovation, organization | 6 |
apalala.be | Security integrated into your processes and corporate culture : Cybersecurity as a driver of opportunity rather than a constraint and source of stress. | individual cybersecurity, cybersecurity human, management cybersecurity, cybersecurity psychology, culture cybersecurity | security, behaviour, cyber, awareness, human | 6 |
resilientsecurity.be | We make businesses resilient against cybersecurity threats and risks in a continuously changing digital world. | resilient cybersecurity, cybersecurity threat | resilient, security, consultancy, threat, manage | 6 |
awarity.be | The Awarity platform provides an all-in-one solution for enhancing your company’s cybersecurity. With a combination of advanced training, realistic phishing campaigns, and in-depth penetration tests, our platform enables businesses to cultivate a culture of awareness and resilience against cyber… | company cybersecurity, cybersecurity combination, curious cybersecurity, cybersecurity situation, extra cybersecurity | awareness, security, campaign, pentest, schedule | 6 |
keysec360.be | “Cybersecurity Awareness Training” for your staff (1 full day or 2 half day sessions for 12 participants). | expertise cybersecurity, cybersecurity fundamental, yearly cybersecurity, cybersecurity conference, meaningful cybersecurity | security, vulnerability, package, continuous, endpoint | 5 |
hacklab.be | HackLab is a virtual hacking lab platform that allows you to create and manage your own hacking labs in seconds. It's the perfect tool for cybersecurity professionals, students, and educators. | tool cybersecurity, cybersecurity professional | lab, hack, virtual, second, help | 5 |
ittopics.be | All Artificial Inteligence Artificial Inteligence Biometrics Cloud computing & virtualization Complex systems Computational science Cybersecurity Data & informatics Data & informatics Data Management e-commerce Federal information standards (FIPS) Health IT Information Technology Internet of… | science cybersecurity, cybersecurity datum | topic, human, usability, system, technology | 5 |
contxt.be | Enjoy this unique experience with a view to the future of technology, exploring key themes data center infrastructure, control room solutions, cybersecurity, data security, disaster recovery, backup, networking, and audiovisual technology. | solution cybersecurity, cybersecurity datum, antwerp cybersecurity, cybersecurity europe, effectively cybersecurity | register, speaker, keynote, schedule, future | 5 |
leroyv.be | Protect your organization's digital assets with a cybersecurity consultant specializing in offensive security. Contact me for tailored solutions. | asset cybersecurity, cybersecurity consultant | consultant, security, asset, offensive, organization | 5 |
ransomwaresummit.be | Cloud computing and security embodies more than simply choosing the right software. There are many different IT career training programs offering courses on cybersecurity. Identifying the weaknesses in your IT infrastructure is crucial. This allows you to limit or even prevent potential damage… | course cybersecurity, cybersecurity weakness, cybersecurity hot, thought cybersecurity, cybersecurity angle | summit, cyber, organization, speaker, antwerp | 5 |
yseb.be | I’ve had the opportunity to learn a lot about cybersecurity. I’ve gained knowledge on red and blue team, besides that I gained a lot of knowledge about the different attacks. | lot cybersecurity, cybersecurity knowledge | feature, pricing, testimonial, network, cloud | 5 |
it-lines.be | 07 Jun, 2024 in ai developers , anthropic , anthropic claude 3 , artificial intelligence , Big Data , Cybersecurity , Developer , Developers , GPT-4 , Innovation , International , large language models , openai , Security , Security News 0 | datum cybersecurity, cybersecurity developer | security, line, cloud, developer, computing | 4 |
maximiliaanmuylaert.be | Topstarter in IT Infrastructure at Planet Talent,Expert Digital Cybersecurity at Agoria,Network Engineer,System Engineer,Scout,Snowboarder | digital cybersecurity, cybersecurity agoria | system, education, science, certificate, engineer | 4 |
theshell-company.be | Provide cybersecurity services to our customers. Helping them in each aspect of their IT security in order to raise their security posture and lower the risk of a security incident. | year cybersecurity, cybersecurity experience | security, shell, testing, penetration, response | 4 |
ozmotion.be | Explainer video to showcase all the different tools Blackberry - Cybersecurity offers and how they work together. Making a clear visual of a more abstract concept, helps to tell the story of how their software can support your company. Introducing each seperate logo and bringing them to life helps… | blackberry cybersecurity, cybersecurity clear | explainer, story, need, audience, jupiler | 4 |
fieldtrust.be | Fieldtrust is a value-added distributor specializing in cybersecurity. Find out how we can help you protect your customers' digital assets and reputation. Visit us today. | distributor cybersecurity, cybersecurity customer | vendor, backup, msp, security, access | 4 |
simac.be | Seven reasons why it's better to choose an IT security ecosystem over point solutions In IT departments, specialists in cybersecurity are often scarce. Then it's a good idea to use an ecosystem or platform from one supplier. Continue reading Teamnology Together with our customers and partners, we… | specialist cybersecurity, cybersecurity scarce | infrastructure, integration, cable, csr, history | 4 |
keystone-solutions.be | Secure your digital landscape with Keystone Solutions. We offer comprehensive cybersecurity measures, from risk assessments to incident response, safeguarding your data and operations. | comprehensive cybersecurity, cybersecurity measure, way cybersecurity, cybersecurity excellence, importance cybersecurity | keystone, technology, security, consultancy, career | 4 |
xdevroey.be | The CyberExcellence project started in January 2022 under the umbrella of the CyberWal initiative and is funded by the Walloon region. It aims to position Wallonia as a major player in cybersecurity on the national and international map by developing a core framework allowing the implementation of… | player cybersecurity, cybersecurity national, thoughtful cybersecurity, cybersecurity competitive | testing, engineering, university, assistant, search | 3 |
datanewsawards.be | Belgian Tech Scale-up Company of the Year Belgian Tech Startup Company of the Year Business Communications Innovator of the Year Customer Centric IT Company of the Year Cybersecurity Company of the Year Data Center Services Company of the Year Artificial Intelligence Innovator of the Year… | year cybersecurity, cybersecurity company | award, edition, category, editorial, winner | 3 |
agisko.be | In an era of relentless technological advancement, the realm of cybersecurity faces unprecedented challenges. The year 2024 marks a critical moment ... | realm cybersecurity, cybersecurity unprecedented | center, infrastructure, device, cloud, workspace | 3 |
rapidvalue.be | We offer end-to-end solutions that cover access management, IGA, and PAM. From securing user authentication to establishing robust identity governance practices and managing privileged access, we provide holistic and integrated services that strengthen your cybersecurity posture and mitigate risks… | governance cybersecurity, cybersecurity solutions, edge cybersecurity, cybersecurity expertise, service cybersecurity | identity, governance, access, privilege, practice | 3 |
arpia.be | Focus: data protection law, cybersecurity law, information technology law and marketing law, as well as intellectual property law and commercial law more generally. | protection cybersecurity, cybersecurity information, cybersecurity cookie, law cybersecurity, cybersecurity law | legal, lawyer, law, assessment, interest | 3 |
sunforest.be | Based in Belgium, SunForest is a modern approach to Industrial Software & Consultancy that helps companies with their Digital Transformation. We have a unique skillset combination of Information Technology and Operational Technology to close the gap and optimize industry processes. Cybersecurity… | process cybersecurity, cybersecurity network, ot cybersecurity | industry, consultancy, custom, cloud, technology | 3 |
interfast-intl.be | Discover our comprehensive IT services tailored to the needs of individuals and businesses. Contact our team of experts to optimize your IT solutions and ensure peace of mind for your business. Services range from pre-purchase advice to application development and cybersecurity to meet your needs… | development cybersecurity, cybersecurity need, cybersecurity training | security, need, individual, remote, buy | 3 |
casper-wouters-portfolio.be | My experience here ranges from my classes in cybersecurity to participating in hackatons and spending numerous hours doing capture the flag challenges. | class cybersecurity, cybersecurity hackaton, cybersecurity certificate | view, database, network, skill, internship | 3 |
datanow.be | There is no doubt that cybercrime is on the increase. Yet there will never be enough people who are able to control cyberattacks. While cybersecurity is omnipresent and seems to provide safe digital environments, hackers are omnipresent as well and they surely will find their way into your… | cybersecurity forbes, cyberattack cybersecurity, cybersecurity omnipresent, cybersecurity privacy | safe, security, digitally, challenge, meeting | 3 |
ceeyu.be | Ceeyu's SaaS platform identifies IT and network vulnerabilities for your company and your supply chain (Third Party Risk Management or TPRM) by combining automated scans (digital footprint mapping, attack surface scanning and cybersecurity risk ratings) with online questionnaire-based risk… | scan cybersecurity, cybersecurity risk, book cybersecurity, cybersecurity expert, platform cybersecurity | risk, security, attack, chain, supply | 3 |
grantthornton.be | Cybersecurity and data privacy threats evolve on a daily basis. It is essential to recognize the threats, understand your exposure, balance your priorities and formulate a comprehensive response. We provide support in addressing both global and local cybersecurity and privacy compliance needs. We… | local cybersecurity, cybersecurity privacy | tax, thornton, grant, overview, advisory | 2 |
inspirehealth.be | Cybersecurity is a hot topic and therefore we are also organized with several IT and OT security expert centers that can guide and assist you through the all kinds of cybersecurity measures, ranging from identity management and access control over secure hosting solutions to data protection, data… | kind cybersecurity, cybersecurity measure | healthcare, crono, system, eco, community | 2 |
analogway.be | Analog Way Eikos 4K Drives LED Videowall in Bridgewater State University’s New Cyber Range Cybersecurity Training Space | range cybersecurity, cybersecurity training | analog, presentation, system, extender, pioneer | 2 |
agchackathon.be | How can the façade of our buildings be part of the solution for the cybersecurity issues companies are facing today? | cybersecurity building, solution cybersecurity, cybersecurity issue | hackathon, glass, facade, challenge, technology | 2 |
alvin.be | My name is Alvin, as is the name of my company. I have a broad interest in computers and related technology. I'm a hacker in both meanings and offer my services both as a sysadmin and as cybersecurity professional. My toolkit consists mainly of Free Software. | sysadmin cybersecurity, cybersecurity professional | file, sysadmin, mainly, relate, technology | 2 |
ev1z.be | On nights, I either work on endless side projects related to IP networks, cybersecurity, cryptography, or music. Or, you know, I drink beer. | thought cybersecurity, cybersecurity howto, network cybersecurity, cybersecurity cryptography | network, server, security, pi, dns | 2 |
cryptosecurity.be | Cyberattacks are a real issue for institutions dealing with classified information. Access to unauthorized persons and the disclosure of classified information can have serious consequences for our institutions and their functioning. Cybersecurity has become a major concern. In this context, the… | function cybersecurity, cybersecurity major | security, accreditation, cryptography, system, legal | 2 |
is4u.be | AI is not just a buzzword; it’s revolutionizing industries, especially cybersecurity. Therefor we are thrilled to invite you to CyberHealth “The role of AI in Security Automation” . | especially cybersecurity, cybersecurity therefor, new cybersecurity, cybersecurity advisor | identity, access, resource, governance, ibm | 2 |
aboutit.be | Forget about VPNs, our bulletproof 7-layer cybersecurity strategy is second to none - and it’s effective even when the devices go off (and when you’re asleep). | layer cybersecurity, cybersecurity strategy | cloud, microsoft, optimization, process, infrastructure | 2 |
apisec.be | and using APIs securely. On the other hand, APISEC's domain-specific demonstrators and trade-off analyses will contribute to a faster development of a complete and safe product. This early investment in cybersecurity will provide a strong competitive advantage in a fast-growing international market. | investment cybersecurity, cybersecurity strong | api, package, knowledge, fintech, security | 2 |
fitce.be | This year we meet with friends and colleagues from all over Europe in the wonderful historical city of Krakow in Poland. The congress theme is very to-the-point with the current international situation: New technologies and services for cybersecurity opportunities and threats... | service cybersecurity, cybersecurity opportunity | cloud, area, congress, membership, past | 2 |
incorp.be | Identities are not only the digital version of humans. Every subject capable of accessing your data or business-critical assets must be digitally managed as an Identity. We would be happy to explain you how we engaged ourself in Identity-centric Cybersecurity practices. | centric cybersecurity, cybersecurity practice | identity, iam, asset, assessment, select | 2 |
asphaliaconsulting.be | As your trusted independent contractor, we understand the unique challenges faced by organizations of all sizes. Our bespoke cybersecurity solutions are meticulously crafted to align with your specific governance needs. From bolstering network security to safeguarding critical data, our services… | cybersecurity solutions, bespoke cybersecurity, cybersecurity solution | consulting, governance, risk, compliance, security | 2 |
soletis.be | At Soletis, we prioritize cybersecurity and data protection. Our experts provide guidance on implementing robust security measures and ensure compliance with GDPR regulations. | cybersecurity gdpr, soletis cybersecurity, cybersecurity datum | process, write, analysis, organization, report | 2 |
coriotech.be | Cybersecurity is a critical concern for businesses in every industry, including hospitality. The hospitality sector is vulnerable to cyberattacks because of the large amount of sensitive customer data it collects... | | security, network, smart, audio, future | 2 |
link2trust.be | Exciting times lie ahead in the realm of cybersecurity! Today, we want to delve into the concept of crypto-agility and how it can empower organizations to fortify their security strategies against evolving threats. What is Crypto-Agility? Crypto-agility refers to an organization’s ability to… | partnership cybersecurity, cybersecurity consulting, realm cybersecurity, cybersecurity today | security, ahead, governance, cryptography, road | 2 |
seceo.be | Seceo is an IT service company specialized in both cybersecurity and information risk consultancy. We stand for providing our customers with state of the art Business and IT consultancy services. All our consultants are senior and have achieved several high level security certifications recognized… | risk cybersecurity, company cybersecurity, cybersecurity information | risk, security, senior, level, consultancy | 2 |
cooperworks.be | Cybersecurity Advice: Our experts provide comprehensive cybersecurity advice, including identifying and addressing potential threats and ensuring the security of your digital assets. | comprehensive cybersecurity, cybersecurity advice | consultant, infrastructure, efficiency, cloud, knowledge | 2 |
echelon.be | Echelon Labs prioritizes your security, offering industry-leading solutions designed to safeguard your business in an increasingly interconnected and vulnerable digital landscape. Trust us to provide the dependable, corporate-grade cybersecurity defenses that your enterprise demands. | today cybersecurity, cybersecurity landscape, grade cybersecurity, cybersecurity defense | lab, security, landscape, comprehensive, secure | 2 |
prodata-systems.be | Prodata Systems is a Belgian IT integrator that has been managing for many years business critical networks and cybersecurity environments in the public and private sector. | network cybersecurity, cybersecurity environment, big cybersecurity, cybersecurity trade | system, network, security, care, critical | 2 |
xelor.be | With our experienced team of recruiters, we have in-depth knowledge of the IT industry and an extensive network of highly qualified candidates. Whether you are looking for a software developer, an IT consultant, a cybersecurity expert, or a data analyst, we have the expertise and the network to… | consultant cybersecurity, cybersecurity expert | vacancy, consulting, manager, candidate, need | 1 |
raven-zaventem.be | At RAVEN Zaventem, we specialize in crafting unforgettable experiences with our comprehensive suite of services. From innovative event planning and cutting-edge VR, AR and MR experiences to educational workshops on the latest in technology and cybersecurity, we have something for every need. Our… | technology cybersecurity, cybersecurity need | raven, room, escape, quote, individual | 1 |
soluxa.be | Soluxa specializes in outsourcing solutions tailored to your technical needs. Our pool of skilled IT engineers offers expertise in network infrastructure, system administration, cybersecurity, and software development. We understand the challenges of finding top technical talent, so we handle… | administration cybersecurity, cybersecurity software | backup, consulting, need, today, efficiency | 1 |
asp.be | We fortify cybersecurity with advanced firewall solutions, granting meticulous control over network access. Use next-gen threat intelligence , proactively identifying and neutralizing dynamic cyber threats. Implement endpoint protection for real-time threat detection and agile response strategies… | | asp, servicenow, automation, cloud, network | 1 |
bergspace.be | We can help you assess, manage, plan, and transform your IT and cybersecurity architecture based on global enterprises standards such as TOYOTA IT security. | plan cybersecurity, cybersecurity architecture | enterprise, security, technology, automation, productivity | 1 |
optimusitservices.be | From consultancy services to software development, recruitment services to outsourcing, data analytics to digital marketing, website design to cloud computing and cybersecurity, We offer solutions to meet all your technological needs. | computing cybersecurity, cybersecurity solution | optimization, optimus, profile, recruitment, search | 1 |
kappadata.be | DORA enhances cybersecurity in the financial sector. Strong authentication, such as with OneSpan's DIGIPASS FX1 BIO, is essential for DORA compliance ... | dora cybersecurity, cybersecurity financial | security, kappa, network, iot, value | 1 |
cxonet.be | …peer learning and distribute relevant information in an efficient way. E-business, leadership, customer success, business execution, funding & lending, enterprise resource planning, cloud computing, supply chain management, unified messaging and cybersecurity are only a few of the key issues. | message cybersecurity, cybersecurity key | discover, leadership, level, community, advisory | 1 |
ferranti.be | …European utilities landscape. At the event, industry leaders converged to discuss the transformative impact of digital technologies on operations, customer engagement, sustainability, collaboration, and cybersecurity within the utilities sector. KEY TAKEAWAYS FROM IDC XCHANGE EVENT: TAKEAWAY 1: […] | collaboration cybersecurity, cybersecurity utility | utility, cloud, industry, energy, operator | 1 |
eitciorg.webhosting.be | …participation in development and adoption of new Information Technologies in domains such as quantum information and communication, AI and cybersecurity through applied research, implementation, standardization, certification and accreditation by joint efforts of academic and industrial IT… | ai cybersecurity, cybersecurity research | institute, european, standard, competency, skill | 1 |
rakels.be | Meanwhile, I also studied computer science. After my judo career, my passion went out to software programming. I worked as an independent software engineer for 10 years. In 2014, my partner, Eric Lafortune, and I founded the cybersecurity company Guardsquare. For 5 years I was CEO. We grew into a… | lafortune cybersecurity, cybersecurity company | gallery, young, tab, passionate, medal | 1 |
nielswille.be | In 2023 I decided it was time to explore the world outside delaware and started a new journey as Solution Architect and Tribe Lead at devoteam, a leading consulting firm focused on digital strategy, platform technologies, cybersecurity and business transformation. | technology cybersecurity, cybersecurity business | consultant, developer, technology, native, lead | 1 |
eddywillems.be | The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity. | | security, speaker, keynote, cyber, organization | 1 |
esolutions.be | To ensure cybersecurity is embedded across the organisation, it's crucial to provide actionable insights tailored to each level—executive, managerial, and technical—via KPIs and metrics. We have the expertise to guide you. | | security, cyber, strategy, ot, cloud | 1 |
zerofeed.be | …and cyber ninja skills. They've scoured the darkest corners of the digital realm, revealing secrets even the pixels didn't know they were hiding. So, get ready to upgrade your platform like a boss, because with great power comes... well, you know the rest. Let the cybersecurity dance begin! 💃🕺🔒🔍 | rest cybersecurity, cybersecurity dance | asset, pricing, inventory, threat, feature | 1 |
onc.be | Protecting your organization from evolving cybersecurity threats is of paramount importance. We design and implement robust security measures to safeguard your network, applications and data while ensuring compliance with privacy regulations. We identify vulnerabilities and risks within your IT… | organization cybersecurity, cybersecurity threat | security, organization, infrastructure, monitor, remedy | 1 |
next7.be | Increased cybersecurity concerns are prompting companies to invest in IT infrastructure which is shaping the M&A activities of the future. | | infrastructure, cloud, secure, efficient, migration | 1 |
hutix.be | Do you know the pitfalls of cybersecurity ? Want to build digital walls and help prevent data leaks? Be our IT security expert . | pitfall cybersecurity, cybersecurity digital | titans, consulting, kick, consultant, career | 1 |
itquality.be | Whether you’re transforming your business idea into reality through our software development expertise or enhancing your digital skills with our specialized training programs, we’re your trusted partner. From fortifying your cybersecurity defences to mastering the intricacies of digital marketing… | partner cybersecurity, cybersecurity defence | testing, meticulously, dream, tech, inclusive | 1 |
tech8.be | Need help with cybersecurity? Starting from scratch or simply looking to improve your effectiveness? Tech8 is your partner for an effective security journey. With 8 years of hands-on experience, assisting both enterprise and SME customers. Get in touch to learn more. | help cybersecurity, cybersecurity scratch | tech, button, security, statement, microsoft | 1 |
4c-foresee.be | Through strong partnerships, knowledge is brought closer to the customer. From security (incl. cybersecurity, GDPR, ...) to data center optimization (incl. cloud computing). | incl cybersecurity, cybersecurity gdpr | centric, interim, manager, advisory, trust | 1 |
iseecure.be | Our cybersecurity experts monitor your environment 24/7 to ensure that no attacks are overlooked and provide expert advice and guidance. | | response, security, remediation, soc, detection | 1 |
hunna.be | As our society becomes ever more digitalized the impact of failing IT infrastructure will increase. The need for strong cybersecurity will increase in relation to the impact of the threats to the IT infrastructure. Experience has shown us again and again that systems are often built with security… | strong cybersecurity, cybersecurity relation | system, usb, sanitation, threat, security | 1 |
besc.be | Explore our diverse array of services, including tailored website development, software engineering, full-scale IT assistance, seamless cloud integration strategies, and vigilant cybersecurity solutions. | vigilant cybersecurity, cybersecurity solution | renovation, insurance, equipment, accounting, diplomatic | 1 |
walhub.be | To become the Walloon manufacturing ecosystem’s one-stop shop for the adoption of new technologies – AI, HPC (High Performance Computing), cybersecurity and IoT to achieve competitive and sustainable industrial and supply chain processes. | computing cybersecurity, cybersecurity iot | wallonia, european, hub, innovation, industry | 1 |
safepoint.be | We can assist you in many different ways to help you meet your cybersecurity and compliance needs using a no-nonsense business driven approach. Our experts are rigorously trained to handle all kind of situations and emergencies, from the design of your security processes and solutions, to their… | way cybersecurity, cybersecurity compliance | security, awareness, career, response, cyber | 1 |
belgianoffshoredays.be | At Cyberplan, we make cybersecurity simple and accessible. With practical audits and pentests, we protect your business against cyber threats. Our services are like a reliable compass, essential for safely navigating the digital seas of every sector, including maritime. Anchor your security with… | cyberplan cybersecurity, cybersecurity simple | offshore, industry, energy, fair, technology | 1 |
climit.be | After struggling to find something I really wanted to do, ClimIT helped me te reignite my interst in networking and cybersecurity. | | career, engineer, network, discover, track | 1 |
mesconsult.be | Building your strategic plan in the context of Manufacturing Execution Performances covering aspects such as Organization, Business Processes, CyberSecurity and Industrial IT Architecture. | process cybersecurity, cybersecurity industrial | asset, organization, activity, domain, process | 1 |
kiwazo.be | Trained a government cybersecurity agency on PowerDNS: DNSSEC, RPZ, Lua-scripting and DDoS-defence techniques | government cybersecurity, cybersecurity agency | cto, dns, cloud, devops, consulting | 1 |
bhc.be | BHC has been labeled as a check company in Digital Transformation and Cybersecurity. This labeling, in addition to guaranteeing seriousness, also allows all companies located in the Walloon region to benefit from significant assistance in the fields of IT. | transformation cybersecurity, cybersecurity labeling | sale, approach, advice, security, custom | 1 |
volt-it.be | Empowering businesses through strategic IT solutions, optimizing systems, and enhancing cybersecurity for seamless and efficient operations. | system cybersecurity, cybersecurity seamless | network, quote, paint, system, engineering | 1 |
comiti.be | From Artificial Intelligence to hybrid cloud, over cybersecurity and managed services, understanding the complex IT landscape is crucial to delivering the right messages to the specialized IT and Tech press. | cloud cybersecurity, cybersecurity service | pr, startup, tech, palo, network | 1 |
finegan.be | The operational implementation of challenges related to the transformation of information systems, IT, cybersecurity, and other financial payments and transactions’ challenge is at the heart of Finegan Solutions. | system cybersecurity, cybersecurity financial | area, activity, view, independent, join | 1 |
digitalgenics.be | …a confusing and overwhelming experience, but it's important to remember that you're not alone. There are professionals who can assist you in mitigating the damage and restoring your security. Don't hesitate to reach out to a trusted tech support team or cybersecurity expert for guidance and support | team cybersecurity, cybersecurity expert | security, asset, sign, need, damage | 1 |
ample.be | Our COE team has over 20 years of experience in implementing winning technologies and expertise in providing quick solutions. We enable our customers with robust and best-in-class ERP Solutions, Blockchain, AI-Powered Solutions, and Cybersecurity Solutions. | solutions cybersecurity, cybersecurity solutions | technology, sap, thing, iot, demand | 1 |
ncpflanders.be | We offer news and event updates , covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020). | security cybersecurity, cybersecurity defence | flander, defence, funding, sign, european | 0 |
nicolasarnouts.be | The company develops satellite modems and had to regularly extract log files, the problem was that employees' computers were several server hops away from the modem to be reached. So one had to set up multiple ssh connections with different credentials, to then execute the appropriate commands &… | cybersecurity audit | problem, python, learn, script, curriculum | 0 |
epact.be | The market is evolving fast, very fast indeed, so the demand for tailored IT services is increasing. The traditional IT infrastructure of businesses is often in need of renewal and there is a growing requirement for software-driven solutions . As an end-to-end partner with many years of experience… | | cloud, continuity, devops, workplace, vacancy | 0 |
ironpeak.be | Review your applications, harden your applications and help embed security in your design. | belgian cybersecurity, cybersecurity consulting, cybersecurity vendor, cybersecurity firm | security, consulting, risk, testing, penetration | 0 |
silurian.be | Silurian® is a European trademark of Silurian SL | | domain, dutch, french, server, api | 0 |
pamica.be | After leaving S1 in 2001, Michel Akkermans co-founded Clear2Pay, an innovative finance technology company focused on delivering global solutions for payments and became its Chairman and CEO. Headquartered in Brussels, Belgium, with offices worldwide, the company's focus is to facilitate banks and… | play cybersecurity, cybersecurity privacy | investor, board, june, pr, private | 0 |
ict-it.be | Roeselare… Developer… Software engineering… IT consulting… IT business analysis… IT support… System… | | june, enterprise, system, march, sap | 0 |
pwc.be | Asset & wealth management Banking & capital markets Consumer markets & retail Aerospace & defence Energy, utilities & resources Financial services Government & public services Health industries Industrial manufacturing & automotive Insurance Real estate Retail & customer Transport & logistics | | industry, pwc, tax, consulting, sustainability | 0 |
tobania.be | As a trusted Business and Technology Consulting partner, we assist you to valorise your business, data and technology in today’s rapidly changing world in which we live, work and communicate. We guide you through your business and digital transformation and enable you to adapt to these fast-moving… | | technology, workplace, testing, future, agility | 0 |
sandervandessel.be | In collaboration with another student, I got to choose between several different projects: smart device security research, writing a guide for starting a security research facility, and creating an IT guide for the elderly. After careful consideration, we decided to go for the smart device… | cybersecurity student | internship, security, cyber, research, device | 0 |
homepharma.be | Be very careful when you receive any of these file types: .zip, .doc, .xls, .pdf, .7z. These are the most common file types used to spread malicious attachments. | | money, attachment, malicious, file, awareness | 0 |
pollevanhoof.be | …financial systems and safety-critical transportation systems have created a strong foundation for my skills in Cyber Security. The combination of experience in both software development and Cyber Security results in a unique and multifaceted perspective regarding the security of your applications. | security cybersecurity, cybersecurity webdesign | security, cyber, elegant, nugget, field | 0 |
sogeti.be | The World Quality Report is the industry’s largest research study providing a comprehensive assessment of the current state of quality engineering practices from around the world, and across different industries. Over the last 15 years, it has tracked and examined the most important trends and… | cybersecurity transformation, cybersecurity testing | engineering, testing, worldwide, partnership, join | 0 |
students2industry.be | Students2Industry is a job fair like no other, 100% focused on attracting students with a taste for the technology sector. We create networking and learning opportunities for both students and companies. | cybersecurity concsulting | fair, register, consultancy, history, prize | 0 |
leaderssl.be | Sectigo (Comodo) offers 2, 3, 4 and 5-year Subscription SSL bundles allowing you to obtain continuous certificate coverage for up to five years while saving you money. According to rules of CA/B forum and for security reasons, your certificate will initially be issued with a maximum validity… | | ssl, certificate, domain, security, trial | 0 |
spikes.be | Spikes helps organisations from strategic advice to innovation, where productivity and teamwork stand central. We guide people and teams during these changes and relief the organisation of its day-to-day management. | trust cybersecurity, cybersecurity solution | knowledge, smart, innovation, spike, manage | 0 |
cioforum.be | …The CIOforum provides a unique network to address the issues and trends that IT professionals face, in an increasingly changing business environment. We organize networking events and provide an interactive social platform to bring IT professionals together in an open and trustworthy community. | | member, network, community, knowledge, issue | 0 |
mvhsolutions.be | MVH Solutions… Home… Cybersecurity… ICT… Contact… cybersecurity… ICT consultancy… | solutions cybersecurity, cybersecurity solution | consultancy | 0 |
digimads.be | Digimads is an IT consulting company that strongly believes in the power of coaching and training. Besides the important technical skills that are required for tech talent, we have a desire to go further with coaching. Coaching is directly concerned with the improvement of performance and… | | soft, skill, tech, strong, brilliance | 0 |
belnet.be | Since 2016, Belnet has been connecting the Federal Scientific Institutions (FSIs) with the internet and each other using the ScienceMAN network. One of the best known member organisations is undoubtedly the Royal Meteorological Institute (RMI). | | technical, admin, connectivity, corporate, network | 0 |
digitribe.be | DigiTribe offers advisory and consulting services, and realizes projects to accelerate digital enablement and innovation. | | community, risk, cloud, innovation, consulting | 0 |
starslinks.be | We understand that the quality of your IT projects depends largely on the quality of the talent you hire. That’s why we’ve developed a rigorous methodology for selecting the best profiles for your company. We work with candidates who possess advanced technical skills, as well as essential human… | | success, consultant, growth, candidate, need | 0 |
k-force.be | K-Force, located in the south of Brussels, is for over 20 years a trusted partner for cloud, IT & telephony solutions for SME's. | free cybersecurity, cybersecurity tip, copy cybersecurity, cybersecurity prediction | telephony, workplace, cloud, sme, responsible | 0 |
c-tegrity.be | all rights reserved - C-tegrity - 2020 | | cloud, meer, consultancy, case, security | 0 |
mca.be | MCA (Maritime Campus Antwerp) guides the maritime industry towards greater cooperation. Visit our MCA LABS coworking space and join MCA Community. | | mca, maritime, community, innovation, antwerp | 0 |
otoo.be | OTOO - Your automotive partner! | | automotive, category, responsible, disclosure, functional | 0 |
o365.be | The fixed monthly price per user includes all Microsoft 365 applications and services, including (password) management with fast and professional support from our K-Force cloud engineers. Thanks to this solution, the purchase and maintenance of a mail server is no longer necessary. In addition… | copy cybersecurity, cybersecurity prediction | microsoft, order, user, dutch, french | 0 |
videntium.be | The increased demand for critical data and the mobility of the assets requires more advanced solutions. Even in the most challenging environments VidentiuM offers real time information sharing and secure efficient communications. We get you connected. | interview cybersecurity, cybersecurity operational | academy, view, real, environment, watch | 0 |
sirris.be | …ambitions. To this end, our customers can count on the efforts of a multidisciplinary team of 150 experts, more than 200 partners, ecosystems, a wide range of industrial labs and tons of inspiration. In this way, together with the companies, we realise some 1,300 innovation projects a year. | | sirris, innovation, lab, industrial, forward | 0 |
expertware.be | Managed IT Services Managed BI & Analytics Managed Security Service Provider Managed Multi-Cloud SAP Consulting & Support Managed SIEM Vulnerability scanning Data discovery and masking Cloud Optimization Next Generation SOC Network Access Control Managed EDR Network Monitoring Data Centre… | infrastructure cybersecurity, cybersecurity manager | cloud, xpert, analytic, consulting, security | 0 |
isaca.be | We are proud to announce that PECB has established a partnership with ISACA Belgium to sponsor their upcoming New Year […] | woman cybersecurity, cybersecurity bright | chapter, security, trust, partnership, member | 0 |
blacklynx.be | Why wait until it’s too late? Enhance your information security now and fortify your digital defenses. With our Cyber Risk Assessments, Incident Response Planning & Support, and personalized Consultations, we help you identify vulnerabilities and fortify your business against cyber threats. | cybersecurity consultation, world cybersecurity, cybersecurity ai, cybersecurity training | response, security, cyber, forensic, awareness | 0 |
acolit.be | Expertise in RDBMS, data acquisition, processing, efficient modeling, protection, analytics | code cybersecurity, cybersecurity cloud | lorem, amet, dolor, sit, consectetur | 0 |
secudea.be | About… Contact… Legal… Network… Services… Training… About Us… Consultancy Services… Assessments… Cookie… | cybersecurity risk | security, subscribe, consultancy, assessment, legal | 0 |
ip3.be | IP3 - CONSULTING in TECHNOLOGY & CYBER SECURITY | consultancy cybersecurity, cybersecurity technology | consulting, technology, security, cyber, consultancy | 0 |
vadordigital.be | Threats are real, sophisticated and diverse. They can hit your business and you may be liable for them. To help you understand the context and the risks, and how to enhance the digital security of your business, Vador Digital invites you to read our Black Book. | business cybersecurity, cybersecurity gdpr | security, gdpr, issue, change, current | 0 |
cyberevent.be | Event 2020… | | cyber, security, secure, aware, awareness | 0 |
janssens-serrurier.be | Because a commercial security camera system has to produce results, we offer what most security camera companies can’t. For CCTV installation companies, it’s important to treat cctv camera installation with a modern approach. Our security camera system installation department is just passionate… | | security, system, smart, detection, building | 0 |
uptimegroup.be | Uptime Group, your trusted advisor. We join forces with our group of experts to create the best end-to-end IT solutions possible to meet your needs. | webinar cybersecurity, cybersecurity healthcare | security, cloud, connectivity, smart, infrastructure | 0 |
g3rt.be | …along the way. I can provide the expertise to ensure your security operations, or any capability therein, gets kickstarted up to industry standards and your team can hit the ground running. Soc capabilities are typically: Incident Response, Analyze & Investigate, Detection Engineering… | | security, network, operation, response, analysis | 0 |
vantongelen.be | Few info about Christophe Vantongelen I'm working as System Administrator @ European Commission into the Directorate Informatics for more than 5 months and previously held a similar position at the European Commission (JRC) in Italy. I was also employed in a series of long-term contracts mainly as… | cybersecurity workshop | security, system, administrator, series, european | 0 |
audit-academy.be | Enhancing the competence, the skills and the efficiency of qualified professionals in governance, risk and audit domains through training, coaching and assessin | cybersecurity awareness, organisation cybersecurity | risk, academy, qualified, competence, control | 0 |
worldnews.be | Real World News about 195 countries in the world in English and French; Latest news; World news today live; news today in the world | | real, africa, french, woman, today | 0 |
qfirst.be | Copyright © 2024 Qfirst | Powered by Astra WordPress Theme | qfirst cybersecurity, cybersecurity bedrijfsdna | ibm, newsroom, cybersec, toggle, necessary | 0 |
axians.be | Axians examines your data to find out how your production or service can be optimized in terms of time and planning. Discover our testimonial about Vitafor now! | | industry, audiovisual, story, process, banking | 0 |
collectiveup.be | We are dedicated to transforming the digital, business, green and social worlds in a humane and inclusive way, without leaving anyone by the wayside. Our work empowers all voices to be heard, fostering the meaningful and effective participation of all community members in Europe’s digital, social… | | seminar, green, agile, innovation, learn | 0 |
iotworld.be | The Internet of Things will connect Billions of Devices, IoT World is connecting you with your Next Customers & Partners TODAY | edge cybersecurity, cybersecurity age | iot, global, market, network, sensor | 0 |
joachim-gielen.be | Our aim is to bring IT-students from different countries and partners together for a project week around the topic of Defensive and Offensive web security. This event will be organised by the Network and System Administration group at the University of Skövde. | passionate cybersecurity, cybersecurity student | security, goal, progress, technical, analysis | 0 |
sabouge.be | MEET THE TEAM… SABOUGE @ DPG MEDIA… CONTACT… Lets talk knop… Read More… CCB – Safe On Web… DPG Media –… | | dpg, safe, rode, remo, san | 0 |
jamesanderson.be | As a business owner & certified consultant, I has helped numerous businesses implement IT strategies for more than 15 years. With a strong understanding of enterprise vision & information technology, I develop initiatives that meet your objectives. | cybersecurity strategy | james, anderson, objective, strategy, advisor | 0 |
corelan.be | Posted in Cons and Seminars | Tagged amazon , corelan , corelan team , corelan-be , corelean , corelean-team , depalsr , download-mona , easy-rm-exploit-tutorial , exploit-writing-in-c , hitb2014ams , httpswww-corelan-be , IOActive , Jennifer Steffens , jennifer-steffens-ioactive , keynote… | corelan cybersecurity, cybersecurity research | exploit, research, tutorial, security, class | 0 |
netafrica.be | Natural resource management (NRM) is the management of natural resources such as land, water, soil, plants and animals, with a particular focus on how management affects the quality of life for both present and future generations (stewardship). | nist cybersecurity, cybersecurity framework | africa, natural, prosperity, resource, risk | 0 |
jrnconsulting.be | Feel free to roam about a bit, find out what JRN can do for you, what his track record is and how to reach him. | passionate cybersecurity, consultancy cybersecurity, cybersecurity topic | consulting, passionate, necessary, track, bit | 0 |
safeonweb.be | Safeonweb wants to quickly and accurately inform Belgian citizens and advise on cyber security high-end digital threats and online security. | centre cybersecurity, cybersecurity belgium | cyber, safe, feed, rss, scam | 0 |
uprightsecurity.be | Welcome to Upright Security, your boutique partner
for identity, access management and cloud security challenges. | cybersecurity technology | security, upright, identity, access, approach | 0 |
nomios.be | Managed network services Enhance your availability and reduce costs with managed services that simplify and automate your networks. | xdr cybersecurity | network, security, technology, secure, enterprise | 0 |
ecomit.be | ECOMIT | We make IT happen! | | server, select, print, endpoint, defense | 0 |
ofep.be | Ofep is the best rated IT Company in Brussels . It provide Web Consulting, Cyber security, IT security audit service. It Simplify, improve and secure your business by offering comprehensive solutions. | | security, consulting, legal, financial, cyber | 0 |