We cannot emphasize enough the importance of guarding against cyber criminals. The new European guidelines (NIS2) highlight that cybercriminals should not be taken lightly. The…
New technologies anew technologies are continually being developed, moulded, and applied. Examples include artificial intelligence (AI), big data, the Internet of Things (IoT), blockchain, and,…
Change management: the key to successful projects When one talks about project management, change management is often mentioned almost immediately. But what does it exactly…
Cloud computing is key to the digital transformation of many modern organizations. However, only few are able to leverage the full potential of this technology.…
Introduction At the end of 2019, China informed the World Health Organization (WHO) about the emergence of a (potentially) deadly virus, threatening modern society. At…
Zero Trust, a different approach towards network securityWe live in an age of tremendous digital presence and fast growing online platforms. More than half of…
Recently, news concerning cyber attacks causing major issues has increased tremendously. In December Maastricht University’s network was encrypted by hackers using ransomware . This had…