Understanding Bring Your Own Device (BYOD) policy: Can it be secure for companies?
The modern workplace is evolving. There is a big shift towards remote work and flexibility, which reflects in an approach known as Bring Your Own Device (BYOD).
The latest news, insights, podcasts, and customer stories
The modern workplace is evolving. There is a big shift towards remote work and flexibility, which reflects in an approach known as Bring Your Own Device (BYOD).
Browsers are our gateway to the internet. We use them for communication, collaboration, and productivity— whether through video meetings, email, or calendars. As more applications shift to the web, browsers become more complex pieces of software. They don’t just render web pages; they also interact with our devices, access files, use APIs, and manage permissions.
De Antwerpse start-up XFA is geselecteerd voor Google’s Growth Academy. Via dat mentorprogramma wil de Amerikaanse techreus bedrijven ondersteunen om naar een hoger niveau te groeien. ‘We willen artificiële intelligentie kunnen gebruiken zonder in te boeten op privacy.‘
Announcing the 2025 Google for Startups Growth Academy: AI for Cybersecurity cohort.
Investing in a robust device security solution is an investment in the growth and reputation of your business. Just as a high-end retail store installs top-tier security systems to protect its valuable product, companies must secure their data to maintain trust and ensure seamless operations. A well-secured business not only prevents risks but also does this efficiently, setting the stage for long-term success.
Cybersecurity is evolving rapidly, but so are the threats that target organizations. While many companies already have strong security measures in place, some gaps still remain overlooked. These blind spots can expose sensitive data to risk, making it critical for CISOs to assess and address them.
Traditional security operations, reliant on a lot of manual processes, are struggling to keep up with the number of threats, alerts, and compliance requirements, leading to inefficiencies and heightened risks. Fortunately, automation is stepping in as a game-changer, improving security operations and enabling IT professionals to focus on what truly matters.
Modern software evolves constantly—new features, improvements, and bug fixes roll out every day. But with millions of lines of code in modern applications, mistakes are inevitable. Some of these mistakes lead to security vulnerabilities that can be used by malicious parties, to, for example, steal data or deploy ransomware. When these vulnerabilities are officially tracked, either because they are reported by the company itself or by independent security researchers (ethical hackers), they get assigned a Common Vulnerabilities and Exposures (CVE) identifier.
Software with system-level permissions, such as your operating system or internet browser, has easy access to your data and device features. If a vulnerability is discovered, it can be exploited to gain control over these access rights and permissions, potentially leading to significant security risks. This is why hackers actively target even the smallest vulnerabilities in such software.
Do I need an antivirus on my phone? That’s a very common question among phone users. However, the answer is more complex than a simple yes or no.
In this episode, we’re joined by Stijn Cornelis, Security Compliance Lead at Infosentry, to discuss the essentials of device security and compliance in today’s rapidly changing cyber landscape. Stijn breaks down how companies of all sizes can navigate key regulations like NIS2 and DORA, sharing practical insights for building a resilient security framework using ISO27001. We also explore the role of automation and proactive monitoring in simplifying compliance while strengthening device security.
At dnergy, securing these devices is essential to support their mission of reducing CO2 emissions in compliance with European and national regulations.