article

Trends: Belgische cybersecurityspecialist XFA toegelaten tot prestigieus Google-mentorprogramma

De Antwerpse start-up XFA is geselecteerd voor Google’s Growth Academy. Via dat mentorprogramma wil de Amerikaanse techreus bedrijven ondersteunen om naar een hoger niveau te groeien. ‘We willen artificiële intelligentie kunnen gebruiken zonder in te boeten op privacy.‘

article

XFA selected for Google Growth Academy: 16 startups using AI to make our world safer

Announcing the 2025 Google for Startups Growth Academy: AI for Cybersecurity cohort.

article

Why leading enterprises are investing in device security

Investing in a robust device security solution is an investment in the growth and reputation of your business. Just as a high-end retail store installs top-tier security systems to protect its valuable product, companies must secure their data to maintain trust and ensure seamless operations. A well-secured business not only prevents risks but also does this efficiently, setting the stage for long-term success.

By
Lars Veelaert
article

Top 5 cybersecurity gaps every CISO should know about

Cybersecurity is evolving rapidly, but so are the threats that target organizations. While many companies already have strong security measures in place, some gaps still remain overlooked. These blind spots can expose sensitive data to risk, making it critical for CISOs to assess and address them.

By
Lars Veelaert
article

How automation is transforming security operations

Traditional security operations, reliant on a lot of manual processes, are struggling to keep up with the number of threats, alerts, and compliance requirements, leading to inefficiencies and heightened risks. Fortunately, automation is stepping in as a game-changer, improving security operations and enabling IT professionals to focus on what truly matters.

By
Lars Veelaert
article

The Reality of CVEs: A useful but imperfect system

Modern software evolves constantly—new features, improvements, and bug fixes roll out every day. But with millions of lines of code in modern applications, mistakes are inevitable. Some of these mistakes lead to security vulnerabilities that can be used by malicious parties, to, for example, steal data or deploy ransomware. When these vulnerabilities are officially tracked, either because they are reported by the company itself or by independent security researchers (ethical hackers), they get assigned a Common Vulnerabilities and Exposures (CVE) identifier.

By
Gijs Van Laer, PhD
article

Attack Scenario #1: Remove Code Execution in OS to Ransomware

Software with system-level permissions, such as your operating system or internet browser, has easy access to your data and device features. If a vulnerability is discovered, it can be exploited to gain control over these access rights and permissions, potentially leading to significant security risks. This is why hackers actively target even the smallest vulnerabilities in such software.

By
Lars Veelaert
article

Sideloading apps: a world of possibilties or a minefield of malware?

Do I need an antivirus on my phone? That’s a very common question among phone users. However, the answer is more complex than a simple yes or no.

By
Lars Veelaert
article

XFA Podcast with Stijn Cornelis (Infosentry) | Navigating Device Security, Compliance & Regulations

In this episode, we’re joined by Stijn Cornelis, Security Compliance Lead at Infosentry, to discuss the essentials of device security and compliance in today’s rapidly changing cyber landscape. Stijn breaks down how companies of all sizes can navigate key regulations like NIS2 and DORA, sharing practical insights for building a resilient security framework using ISO27001. We also explore the role of automation and proactive monitoring in simplifying compliance while strengthening device security.

article

dnergy brings flexibility to their workforce while remaining secure with XFA

At dnergy, securing these devices is essential to support their mission of reducing CO2 emissions in compliance with European and national regulations.

article

Trends: ‘Gemiddeld voldoet 40 procent van werktoestellen niet aan veiligheidsvoorschriften’: Start-up XFA werkt aan cybersecurity van hoger niveau

XFA helpt organisaties om elk toestel van medewerkers te beschermen, zonder dat zij de controle verliezen of privacygevoelige data moeten delen. De Antwerpse start-up begint aan een project om onderzoek te doen naar nog meer diepgaande beveiligingsmethodes.

article

A modern approach to cybersecurity beyond the hype of Zero Trust

As we transitioned from traditional network environments to a modern distributed IT landscape marked by remote work, cloud computing, and the increased use of personal devices for work, traditional security models have become ineffective. This shift necessitates a more robust and adaptable security approach, leading to the adoption of the Zero Trust framework. This new approach is moving away from old perimeter-based security models to one where identity and authentication becomes the central part. This approach necessitates continuous checks on the security status of assets and user privileges to protect an organization’s data and resources.

By
Gijs Van Laer, PhD