Xylos brands

Security 9 blogposts

How secure is your company’s IT infrastructure? Whether your data centre is located on-premises, in the cloud or both, and whether your employees work on the internal network, on the road or at home: cyberattacks involving threats like ransomware and zero-day exploits always lurk around the corner. Want to know how you can prevent these viruses from harming your business and how you can adequately secure your network, mobile devices and servers? Read our bloggers’ tips and tricks.

Implement a secure Azure environment with Check Point CloudGuard

Philip Wagemans
12/06/2019

It’s crucial to secure cloud environments properly, but all too often, the security of these publicly available resources in the architecture remains just an afterthought. How do we remedy this?

The 6 Azure security facts you should know

Michel Van Hoof
15/03/2019

“How does Microsoft provide the security of my Azure infrastructure, data and applications?” In this blog, we’ll dive into 6 security insights concerning the Azure Cloud.

Identity and Access Management: discover our solutions

Geert Gijsels
23/01/2019

Our IAM team believes a strong and secure identity policy is needed in today's digital world. Ready to discover our solutions? 

Cloud Security is… getting a grip on your data outside of your organisation

Johan Celis
31/10/2018

The public cloud is used everywhere. In almost all businesses, employees share files through cloud services, teams use apps to keep track of lists and browser plugins regulate traffic to the world outside of the company. The downside is that the IT department can’t really manage this traffic. With these tips, we’ll help you keep your data under control – locally as well as in the cloud.

Connected Factory: added value, uses and how to start?

Today smart products and digitization can be found all around us in the market. June is a good example of this. This service makes decisions based on external data such as energy prices and real-time information from your meter readings. This gives you, as a private individual, more insight into your energy consumption, and the lowest rates and the cheapest supplier are automatically selected for …

Being attacked by supervillain Peyta? Xylos to the rescue!

Johan Celis
28/06/2017
Enter Peyta (aka Petya or Petrwrap), the new ransomware variant that is spreading. She has many similarities to Wannacry. They both use an NSA exploit known as EternalBlue that targets a SMB vulnerability (CVE-2017-0144), for which Microsoft released a patch in March. Unfortunately, Petya has a few more tricks up her sleeve. What makes Peyta more malicious? Cyber-criminals have learned from the …

What impact will the GDPR have on your cloud endeavours?

Karim Vaes
22/06/2017
Introduction The General Data Protection Regulations or GDPR came into force in April 2016. Some people think they are a thorn in the side of cloud providers, but I beg to differ. I regard these regulations as an aid rather than a threat to investment in the cloud. What are the "GDPR" about? In essence, the GDPR define the rules that apply to using and processing personal data of EU residents. …

WannaCry? We’ll get you smiling again

Johan Celis
13/06/2017
On Friday 12 May, a new version of ransomware WannaCry hit many countries worldwide. And the attack is still not over. As long as we continue to unthinkingly open and left-click email files, this sort of problem will never go away. Anti-malware companies will grab the chance to promote their products. But, what lessons can we learn from this attack? What is ransomware? Ransomware is a form of …

Security context on mobile devices

Tim Jacobs
09/12/2011
This post examines the security context for mobile devices. Often, the assumption is made that a mobile device can be secured through a complete lock down. We will argue that from and end-user perspective, more interesting starting points for security exist.