Last Updated on November 14, 2025 Some stories are so absurd that they seem almost funny. Until you realize what is really at stake. In October 2025, there was a break-in at the world-famous Louvre. What did they find?The password for the security camera system was… “Louvre.” A museum that spends millions of euros on…
Risk assessment & the 5×5 risk matrix
Last Updated on August 21, 2025 Series: From baseline measurement to strong cybersecurity – Part 3 In Blog 2, you learned how to create an asset inventory and classify your assets according to the CIA classification (and possibly Privacy). Now it’s time for the next step: identifying your risks with a risk assessment. What is…
How to create a complete asset inventory
Last Updated on September 15, 2025 Series: From baseline measurement to strong cybersecurity – Part 2 In Blog 1 of this series, you discovered why an asset inventory combined with a risk assessment is the best first step toward strong cybersecurity. Today, we will focus on steps one and two: creating your asset inventory and…
Want to tackle your cybersecurity? Start with an asset inventory and risk assessment
Last Updated on August 20, 2025 Series: From baseline measurement to strong cybersecurity – Part 1 Want to improve your cybersecurity, but not sure where to start? That sounds familiar. The choices can often be overwhelming: tools, procedures, frameworks…However, there is a smart first step that will help you get started with a pragmatic approach…
Everything you want to know about the NIS2 guideline
Last Updated on September 3, 2025 Cyber threats are a reality that every organization faces today. With the introduction of the NIS2 Directive, the European Union is taking an important step to better manage these threats and protect critical sectors. But what exactly does this directive entail? And what does it mean for your organization?…