- Home
- The password is dead and nobody has the decency to tell you
- Compliance theatre: fifty documents, zero defence
- The mediocre hacker and your unremarkable business
- Your backup is a lie your vendor sold you
- LastPass and the lie of the vault
- NIS2: the reality check your consultant didn't charge for
- The CrowdStrike weekend and what it taught you about trust
- The questionnaire that proves nothing but takes three weeks
- Template: GDPR Data Processing Agreement
- Template: ISO 27001 Information Security Policy
- Runbook: NIS2 Incident Response
- Procedure: Data breach notification (GDPR)
- Template: AI Usage Policy for SMB
- Playbook: Ransomware Recovery
- Threat Briefing — April 2026
- Snowflake and the door you left open yourself
- The cyber insurance fairy tale
- MFA fatigue and the teenager from Argentina
- The logs nobody reads, and why you still need them
- The insider nobody saw coming (and mostly doesn't exist)
- Security awareness theatre: why training your people doesn't work
- "We use AWS so we're secure"
- The patch you can't apply
- MOVEit and the door already open
- Security theatre and the airport
- Zero-day as a marketing term (and why almost everything is an n-day)
- "We get pentested so we're secure"
-
Security Measures
-
Web Security
- SQL Injection Prevention
- XSS Prevention
- Command Injection Prevention
- Path Traversal Prevention
- SSTI Prevention
- XXE Prevention
- SSRF Prevention
- Deserialization Prevention
- Client-Side Security
- Authentication Hardening
- Security Headers
- Input Validation & Output Encoding
- TLS/SSL Configuration
- API Security
- File Upload Hardening
- OAuth & OpenID Connect
- Secure Development Lifecycle
-
Network & Active Directory
- Preventing Initial Access
- Stopping Detection & Evasion
- Preventing Privilege Escalation
- Active Directory Hardening
- Kerberos Hardening
- Stopping Lateral Movement
- Credential Protection
- ADCS Hardening
- Detecting Persistence
- Preventing Tunneling
- Linux Hardening
- Windows Hardening
- E-mail & DNS Hardening
- MSSQL Hardening
- Network Segmentation & Firewall
- Logging, Monitoring & SIEM
- Backup & Disaster Recovery
- Vulnerability Management & Patch Policy
- Zero Trust Architecture
- Wireless & Physical Security
- Security Awareness & Social Engineering
-
Cloud Security
- Preventing Cloud Reconnaissance
- AWS Hardening
- Azure & Entra ID Hardening
- GCP Hardening
- Container Hardening
- CI/CD Pipeline Hardening
- Serverless Hardening
- Stopping Cloud Lateral Movement
- Preventing Cloud Persistence
- Cloud Detection & Logging
- Kubernetes Hardening
- Infrastructure as Code Security
- Secrets Management
-
Executives & Governance
- Cybersecurity as Board Responsibility
- Risk Management and Risk Analysis
- NIS2 and European Cyber Legislation
- GDPR Privacy Compliance
- Director Liability
- Security Budget and Investment
- Incident Response and Crisis Management
- Supply Chain and Supplier Risk
- Cyber Insurance
- Security Metrics and Board Reporting
- Consumers & Home Users
-
Reference & Architecture
- Defense Measures Mapping
- Implementation Priorities Matrix
- Incident Response Quick Reference
- Compliance & Governance
- Hardening Checklists
- Compliance Mapping Matrix
- Secret Management and API Key Rotation
- Security Architecture Principles
- Reference Architectures (Web, Network, Cloud)
- ADR Security Decision-Making
- Threat Modeling in Practice
-
Web Security
- Registreren