REAL RANSOMWARE CASES
This short article is based on a round table " What can we learn from real cases of a cybersecurity breach ?" organised by Check Point Software Technologies Ltd. and Pointury on May 4, 2023.
This short article is based on a round table " What can we learn from real cases of a cybersecurity breach ?" organised by Check Point Software Technologies Ltd. and Pointury on May 4, 2023.
Het Potentieel van Edge Computing Ontketenen
De Toekomst Bevrijden
Toekomstbestendige Organisaties
Navigeren door Uitdagingen op het Gebied van Architectuur, Platforms en Infrastructuur
Het Samenspel van CIO & CMO
Samenwerking in het Tijdperk van Digitale Transformatie
Schaalbare Computing met Kubernetes
Navigeren naar de Toekomst
This article is based on an online round table " The connected data economy” organised by Blents, Boomi and Pointury on October 27, 2022. We learned from Renta Solutions, FCR Media and Cebeo how they create value with connected data.
This article is based on a physical round table " We need a quantum step in cybersecurity” organised by Akamai and Pointury on October 20, 2022. We met with top CIO's and CISO's in restaurant Michel in Groot-Bijgaarden to share experiences and insights about cybersecurity.
This article is based on an online round table "How to respond to ransomware attacks” organised by Pointury on September 22, 2022, during which a group of digital leaders met to discuss cyberthreats with Miguel De Bruycker, Managing Director of the Centre for Cyber security Belgium.
Article is based on physical round table " The inconvenient reality of cybersecurity” organised by Pointury on September 7, 2022 .