article

Understanding Bring Your Own Device (BYOD) policy: Can it be secure for companies?

The modern workplace is evolving. There is a big shift towards remote work and flexibility, which reflects in an approach known as Bring Your Own Device (BYOD).

By
Lars Veelaert
article

Attack Scenario #2: Browser Exploit

Browsers are our gateway to the internet. We use them for communication, collaboration, and productivity— whether through video meetings, email, or calendars. As more applications shift to the web, browsers become more complex pieces of software. They don’t just render web pages; they also interact with our devices, access files, use APIs, and manage permissions.

By
Lars Veelaert
article

Trends: Belgische cybersecurityspecialist XFA toegelaten tot prestigieus Google-mentorprogramma

De Antwerpse start-up XFA is geselecteerd voor Google’s Growth Academy. Via dat mentorprogramma wil de Amerikaanse techreus bedrijven ondersteunen om naar een hoger niveau te groeien. ‘We willen artificiële intelligentie kunnen gebruiken zonder in te boeten op privacy.‘

article

XFA selected for Google Growth Academy: 16 startups using AI to make our world safer

Announcing the 2025 Google for Startups Growth Academy: AI for Cybersecurity cohort.

article

Why leading enterprises are investing in device security

Investing in a robust device security solution is an investment in the growth and reputation of your business. Just as a high-end retail store installs top-tier security systems to protect its valuable product, companies must secure their data to maintain trust and ensure seamless operations. A well-secured business not only prevents risks but also does this efficiently, setting the stage for long-term success.

By
Lars Veelaert
article

Top 5 cybersecurity gaps every CISO should know about

Cybersecurity is evolving rapidly, but so are the threats that target organizations. While many companies already have strong security measures in place, some gaps still remain overlooked. These blind spots can expose sensitive data to risk, making it critical for CISOs to assess and address them.

By
Lars Veelaert
article

How automation is transforming security operations

Traditional security operations, reliant on a lot of manual processes, are struggling to keep up with the number of threats, alerts, and compliance requirements, leading to inefficiencies and heightened risks. Fortunately, automation is stepping in as a game-changer, improving security operations and enabling IT professionals to focus on what truly matters.

By
Lars Veelaert
article

The Reality of CVEs: A useful but imperfect system

Modern software evolves constantly—new features, improvements, and bug fixes roll out every day. But with millions of lines of code in modern applications, mistakes are inevitable. Some of these mistakes lead to security vulnerabilities that can be used by malicious parties, to, for example, steal data or deploy ransomware. When these vulnerabilities are officially tracked, either because they are reported by the company itself or by independent security researchers (ethical hackers), they get assigned a Common Vulnerabilities and Exposures (CVE) identifier.

By
Gijs Van Laer, PhD
article

Attack Scenario #1: Remove Code Execution in OS to Ransomware

Software with system-level permissions, such as your operating system or internet browser, has easy access to your data and device features. If a vulnerability is discovered, it can be exploited to gain control over these access rights and permissions, potentially leading to significant security risks. This is why hackers actively target even the smallest vulnerabilities in such software.

By
Lars Veelaert
article

Sideloading apps: a world of possibilties or a minefield of malware?

Do I need an antivirus on my phone? That’s a very common question among phone users. However, the answer is more complex than a simple yes or no.

By
Lars Veelaert
article

XFA Podcast with Stijn Cornelis (Infosentry) | Navigating Device Security, Compliance & Regulations

In this episode, we’re joined by Stijn Cornelis, Security Compliance Lead at Infosentry, to discuss the essentials of device security and compliance in today’s rapidly changing cyber landscape. Stijn breaks down how companies of all sizes can navigate key regulations like NIS2 and DORA, sharing practical insights for building a resilient security framework using ISO27001. We also explore the role of automation and proactive monitoring in simplifying compliance while strengthening device security.

article

dnergy brings flexibility to their workforce while remaining secure with XFA

At dnergy, securing these devices is essential to support their mission of reducing CO2 emissions in compliance with European and national regulations.