Latest News

Article image

Secure your AI systems with AI Pentesting

Are you deploying an AI-powered application and do you want to know how secure it really is? Our pentesters can assess it and show you where to improve security.

Article image

Cybersecurity: Core or Cover?

Too often, security is an afterthought. But waiting until vulnerabilities appear is costly and ineffective. In this article, Dirk Jan van den Heuvel, Managing Director at Secura / Bureau Veritas Group, shares his opinion.

Article image

External Cyber Threats for Municipalities: What you should now

The biggest external cyber threats for municipalities and how to mitigate them while ensuring compliance with the new BIO2.0 requirements.

Meet Us at these events

21-05-2025

Nijmegen

The Netherlands

Latest Webinars

Article image

Webinar on Demand | What happens if you don’t comply with NIS2?

Will authorities wait, or should you act now?

Article image

Webinar on Demand | NIS2 challenge: how to manage large numbers of suppliers

Watch the replay of our webinar on how to effectively manage NIS2 supplier compliance in complex supply chains.

Article image

Webinar on Demand | Hacking AI - Understanding cyber risks in AI-driven applications

Watch the replay of our webinar on cybersecurity risks in AI-driven applications.

Highlight-image

Explore Our Expert Webinars

Stay ahead in cybersecurity by exploring our webinar archive. It's packed with expert discussions and insights on NIS2 and more.

Check out our Webinar Archive