portwatch.be | United for safer ports. PortWatch is the Federal government's central reporting point for suspicious situations in and around Belgian ports. What is a suspicious situation? Any situation that you think is unusual. | point suspicious, suspicious situation, port suspicious, exactly suspicious, unusual suspicious | unusual, report, safe, federal, united | 14 |
iseecure.be | Incident Response: Our SOC Team engage upon any suspicious activity you see in your environment, to detect, respond and remediate. | team suspicious, suspicious activity, analysis suspicious, suspicious file | response, security, remediation, soc, detection | 2 |
afavor-it.be | Our speciale “ Security Health Check Inspector ” is a toolset that in real-time shows you what suspicious activities are currently taking place in your environment. | time suspicious, suspicious activity, risk suspicious, suspicious file | security, favor, campaign, resource, environment | 2 |
asbestbureau.be | For certain (suspicious) applications of asbestos, the necessary samples must be taken in accordance with the expected inspection protocol of OVAM. If the client does not allow such sampling, the material to be inspected will be listed as "suspicious of asbestos" by default. | certain suspicious, suspicious application, material suspicious, suspicious asbestos | asbestos, quote, inventory, sample, certificate | 1 |
bocq.be | The bottling line has an hourly capacity of 22,000 bottles 25 cl or 33 or 8,000 75cl bottles. Empty bottles are extracted from the bins and fed to the washer where they are sterilized and cleaned of their old labels. The inspection machine then detects and removes any suspicious bottles (defects… | machine suspicious, suspicious bottle | beer, bitterness, strength, length, brewery | 1 |
xpr.be | Our office protects the patented original and identifies imitations. We do this very thorough and thanks to many years in the sector, we can count on a vast network of contacts who assist us in hunting down information or tracking down suspicious transactions. | information suspicious, suspicious transaction | statement, thorough, power, assignment, possibly | 1 |
janesbrussels.be | «It’s not that easy to find fun bars with both a vibrant atmosphere and a good wine list in Brussels. It’s almost as if you’d either have to be a wine-bar or «just a bar», and in that case serve suspicious house wine». That’s what Jane said when she told us about the spirit of her bar «Jane’s» –… | case suspicious, suspicious house | wine, craft, music, appetizer, beer | 1 |
kizombalovefunctionaltherapy.be | The IP address of visitors, the ID of logged-in users and the identifiers of log-in attempts are conditionally recorded to check for malicious activity and to protect the site against specific types of attacks. Examples of conditions when logging in include: login attempts, logout requests… | request suspicious, suspicious url | therapy, functional, health, medicine, care | 1 |
soundslave.be | At first, people were rather suspicious of the band's attempt to approach Chris Cornell, who, by definition, is unrivaled. But after hearing a few live recordings, in early 2023, their skepticism turned into enthusiasm. | people suspicious, suspicious band | tribute, cornell, lineup, independently, scene | 1 |
aml-cft-training-financial-forensic-services.be | The professionals are also called ‘reporting entities’. This means that when they encounter suspicious (financial) transactions in their professional activities, they have to report these transactions to the national financial intelligence unit (FIU). Every country has to have such a FIU… | entity suspicious, suspicious financial | financial, money, laundering, crime, financing | 1 |
dju.be | Detect Suspicious Suspicious User User Behavior Behavior and and Stop Stop Malware Malware Attacks Attacks Through Through Cloud Cloud Services Services - - Elastica | suspicious user | photography, youtube, light, photographer, lightroom | 1 |
identityfraud.be | i-Force periodically performs analyses of bank account transactions (focused on payments). Via these analyses we are able to identify suspicious transactions which could indicate fraudulent actions. As a second step, we are able to define flaws in Internal Procedures and set up new rules to… | able suspicious, suspicious transaction | identity, security, fake, domain, report | 1 |
sofierenier.be | Basic set of masks to function in society without people getting suspicious | oilstick, oil, cardboard on wooden panel, 50 x 30 cm, 2023 | people suspicious, suspicious oilstick | view, oil, wooden, panel, safety | 1 |
dirkcastelein.be | …by Paul Valéry, which is lying around in the studio of the painter. Dirk Castelein harbours a similar distrust of his own work. Something that has been created in one stroke, must be very suspicious. It has to be contained, can marinate for a while in the studio and in the mind of the painter. | stroke suspicious, suspicious studio | painting, painter, stroke, sentence, think | 1 |
kuras.be | Our office protects the patented original and identifies imitations. We do this very thoroughly and thanks to our many years of experience in the sector, we can count on an extensive network of contacts that assist us in tracing information or detecting suspicious transactions. | information suspicious, suspicious transaction | statement, criminal, law, trademark, private | 1 |
bapie.be | …inspectors have several times highlighted the ability of parallel traders in their repackaging operations to identify and eliminate suspicious packages before they reach patients – an effective line of defense in the fight against falsified medicines. Afforable Medicines Europe (and… | operation suspicious, suspicious package | parallel, trade, medicine, trader, european | 1 |
ctif-cfi.be | CTIF-CFI is in charge of processing suspicious financial facts and transactions linked to money laundering and terrorism financing reported by institutions and individuals specified in the law. | charge suspicious, suspicious financial | disclosure, annual, entity, law, form | 1 |
desktop.be | sets up remote desktop software, they can view your screen, access your files, and even control your computer without your knowledge. It is important to regularly monitor your computer for any suspicious activity and ensure that your remote desktop settings are secure to prevent unauthorized access. | computer suspicious, suspicious activity | desktop, shortcut, icon, file, window | 1 |
cyber-wise.be | Don't trust an e-mail you've received? Be sure to check the sender and the link in the e-mail. If one of the addresses look suspicious, it's probably a phishing attempt. | address suspicious, suspicious probably | wise, cyber, attempt, step, sender | 1 |
webcammodel.be | …it. Some of the BEST OnlyFans accounts hide their number of followers so people don't know their earnings and they can stay safe, so don't be suspicious of that 😉. Also, give them some love, scroll to the picture ☝ and click on the ♥ to upvote the profile and improve the ranking of this profile… | safe suspicious, suspicious love | lorem, dolor, amet, quisque, ipsum | 1 |
balestra.be | You might think this episode is all about Formula 1, but it is actually all about adoption; more specific about the biggest 3 adoption propositions that we can think of in Microsoft 365. This means, going through the core applications (Outlook, SharePoint and Teams) and talking about what feature… | ep suspicious, suspicious weasel | sharepoint, distil, forward, leap, big | 0 |
ynias.be | I'm a 27 year old guy currently working as a Microsoft Cloud Consultant at Qubix, graduated in 2020 with a associate degree in programming. In 2021 I started my secondary job as a self-employed IT'er. My company bcyber has been launched. | detail suspicious, suspicious incident | resume, consultant, currently, cloud, microsoft | 0 |
fdproductions.be | FD Productions is a dedicated team of audiovisual experts creating premium video content, commercials, aftermovies and branded content to add value to your story. We’re an end-to-end production company meaning that we feature full production capabilities. In conclusion, we take care of your… | suspicious antwerp | aftermovie, story, premium, dedicate, audiovisual | 0 |
xmconsulting.be | Enrich internal data and log files with threat intelligence feeds in order to better detect security incidents. | compromization suspicious, suspicious activity, analysis suspicious, suspicious file | security, cyber, threat, asset, remediation | 0 |
orlabarry.be | The breeder looks up, the ring goes silent, he knows the game is up. 920 anyone? 920 come on, look at this fantastic animal. Are there are no more bids? | salute suspicious, suspicious stranger | stone, blue, artist, visual, green | 0 |
nerveus.be | Kalender… Playlist… SOLD… | suspicious mind | sample, jul, jun, title, text | 0 |