REAL RANSOMWARE CASES
This short article is based on a round table " What can we learn from real cases of a cybersecurity breach ?" organised by Check Point Software Technologies Ltd. and Pointury on May 4, 2023.
This short article is based on a round table " What can we learn from real cases of a cybersecurity breach ?" organised by Check Point Software Technologies Ltd. and Pointury on May 4, 2023.
Libérer le Potentiel de l'Edge Computing
Donner du Pouvoir au Futur
Des Organizations Pérennes
Naviguer à Travers les Défis de l'Architecture, des Plateformes et de l'Infrastructure
L'Interaction du CIO & CMO
Collaboration à l'Ère de la Transformation Numérique
Informatique Évolutive avec Kubernetes
Naviguer vers le Futur
This article is based on an online round table " The connected data economy” organised by Blents, Boomi and Pointury on October 27, 2022. We learned from Renta Solutions, FCR Media and Cebeo how they create value with connected data.
This article is based on a physical round table " We need a quantum step in cybersecurity” organised by Akamai and Pointury on October 20, 2022. We met with top CIO's and CISO's in restaurant Michel in Groot-Bijgaarden to share experiences and insights about cybersecurity.
This article is based on an online round table "How to respond to ransomware attacks” organised by Pointury on September 22, 2022, during which a group of digital leaders met to discuss cyberthreats with Miguel De Bruycker, Managing Director of the Centre for Cyber security Belgium.
Article is based on physical round table " The inconvenient reality of cybersecurity” organised by Pointury on September 7, 2022 .