article

XFA Podcast with Stijn Cornelis (Infosentry) | Navigating Device Security, Compliance & Regulations

In this episode, we’re joined by Stijn Cornelis, Security Compliance Lead at Infosentry, to discuss the essentials of device security and compliance in today’s rapidly changing cyber landscape. Stijn breaks down how companies of all sizes can navigate key regulations like NIS2 and DORA, sharing practical insights for building a resilient security framework using ISO27001. We also explore the role of automation and proactive monitoring in simplifying compliance while strengthening device security.

article

dnergy brings flexibility to their workforce while remaining secure with XFA

At dnergy, securing these devices is essential to support their mission of reducing CO2 emissions in compliance with European and national regulations.

article

Trends: ‘Gemiddeld voldoet 40 procent van werktoestellen niet aan veiligheidsvoorschriften’: Start-up XFA werkt aan cybersecurity van hoger niveau

XFA helpt organisaties om elk toestel van medewerkers te beschermen, zonder dat zij de controle verliezen of privacygevoelige data moeten delen. De Antwerpse start-up begint aan een project om onderzoek te doen naar nog meer diepgaande beveiligingsmethodes.

article

A modern approach to cybersecurity beyond the hype of Zero Trust

As we transitioned from traditional network environments to a modern distributed IT landscape marked by remote work, cloud computing, and the increased use of personal devices for work, traditional security models have become ineffective. This shift necessitates a more robust and adaptable security approach, leading to the adoption of the Zero Trust framework. This new approach is moving away from old perimeter-based security models to one where identity and authentication becomes the central part. This approach necessitates continuous checks on the security status of assets and user privileges to protect an organization’s data and resources.

By
Gijs Van Laer, PhD
article

XFA Podcast with Ayo Akinyele (Bolt Labs) | Digital Asset Security, MPC, & Zero-Knowledge Proofs

In this episode, we are joined by Ayo Akinyele, CEO of Bolt Labs, for an exciting conversation about the future of digital asset security. We dive deep into cutting-edge cryptography, exploring how multi-party computation (MPC) and zero-knowledge proofs are transforming blockchain security. Ayo also shares insights on launching Lock-Keeper, a revolutionary solution for safeguarding private keys in Web3, while balancing security and user experience.

article

How Byteflies enables flexibility while keeping devices secure with XFA

Byteflies is a medical device company that wants to change the future of healthcare

By
Byteflies
article

XFA Podcast with John Opdenakker (Wolters Kluwer Belgium) | Cybersecurity Culture, Social Media & Password Management

We’ve invited John Opdenakker, IT Security Manager at Wolters Kluwer Belgium to join us as we delve into an insightful conversation on the forefront of cybersecurity. We cover the importance of fostering a strong cybersecurity culture, the influential role of social media in the cybersecurity landscape, and practical approaches to implementing effective password management solutions.

article

Most common device hacks explained

In an age where digital security is crucial, understanding how cyber attacks operate is essential for protecting personal and corporate data. Here are five common cyber attacks explained, along with strategies to safeguard against them.

By
Lars Veelaert
article

XFA Podcast with Niels Hofmans (Intigriti) | Bug Bounties, Automation, & Trust

In this episode, we had the pleasure of hosting Niels Hofmans, Head of Security at Intigriti. Join us as we dive into an inspiring conversation covering the latest topics in cybersecurity. We discuss bug bounty programs and their role in modern cybersecurity, transforming security teams from naysayers to enablers, and how automation is revolutionizing compliance for organizations.

article

How SEEN found a light and privacy-friendly alternative to MDM

Anthony Harrison is Operations Director and Co-founder at SEEN, an innovative Norway-based video production company. Recently, SEEN went searching for device security solution to gather evidence for their ISO 27001 certification, in line with its company values.

By
Anthony Harrison
article

Rewatch: Webinar on Modern Cybersecurity

XFA and Cybercontract hosted a session tailor-made for IT/Cybersecurity decision makers & business owners to get a grasp on modern cybersecurity

article

An Optimist’s View in the Cybersecurity Crystal Ball of 2024

Significant progress has been made in recent years in defending against cyber attacks. We now have robust measures to counteract the most common attacks, transforming this issue into one of education. It is essential to ensure that companies are equipped with the necessary knowledge and tools to mitigate risks and prevent attacks effectively. Consequently, we are optimistic about the future and in this post we will explore some of these positive developments that we anticipate in the coming year.

By
Gijs Van Laer, PhD
article

Antwerpse start-up helpt bedrijven toestellen van medewerkers te beveiligen

De Antwerpse start-up XFA wil organisaties beschermen tegen onbeveiligde toestellen, zonder dat medewerkers de controle en hun privacy verliezen. Ze haalt daarvoor een half miljoen euro op.

article

Start-up XFA secures capital round of half a million euro

We are thrilled to announce a significant milestone for XFA, our Antwerp-based B2B cybersecurity start-up specializing in device security. Thanks to the support of Flemish investment company PMV, Seeder Fund, and Investee, we have secured half a million euros to further expand our market presence and continue addressing the escalating challenges of cyber threats.

article

The superpower of automatic deployments

Every change we make to our systems at XFA requires rigorous checks and a mandatory code review. This is a common industry practice and considered essential when developing a sensitive application. Companies often choose to batch changes that should be tested and (maybe) delivered in the hopes of optimizing the time spent writing code, instead of losing time on redundant testing and deploying small iterations.

By
Lars Veelaert
article

Embracing Zero Trust Application Access (ZTAA) for a Modern Security Strategy

In the ever-evolving landscape of cybersecurity, staying ahead of threats and vulnerabilities is crucial.

By
Gijs Van Laer, PhD