Shift left, secure first: what you need to know about DevSecOps

Discover the benefits of DevSecOps and the shift left approach to security with ActWise expert, Jochen. Learn how integrating security from the beginning can minimize risks and reduce costs.

Meet Arne Bieseman

1. Who is Arne? Introducing Arne, a cyber security consultant who is always up for an adventure. With a background in Applied Computer Sciences, Arne's affinity for Cybersecurity emerged early on. His journey began with earning the 'Cybersecurity Essentials' certification…

ActWise crowned “CyberArk Growth Partner of the Year”

ActWise has received the 'Growth Partner of the Year for the North European region' award. This award is confirmation of the vision and drive within the company and the role that ActWise is trying to take in the cybersecurity world.

The Power of Endpoint Privilege Management

CyberArk EPM as an effective and efficient solution against cryptolockers

Talking Security: Why vishing is the new phishing, and how to prevent it! 

Talking Security: Why vishing is the new phishing, and how to prevent it! Welcome to the world of modern cyber threats, where even your phone calls aren't safe from the clutches of cunning hackers. In this blog, we dive into…

PAM and Glam: How ActWise Gets You Ready for CyberArk Stardom! 

Embark on a journey to cybersecurity excellence with ActWise, your seasoned guide to privileged access management (PAM) and CyberArk implementation. In today's digital landscape, protecting sensitive assets is paramount, and ActWise provides tailored solutions to meet your unique needs.

IS4U & ActWise Hero – Jochen Kerremans

Hello there! My name is Jochen Kerremans, a 27-year-old security consultant. I am part of the IS4U group for almost 5 years now and it has been a blast so far! Allow me to provide further insights into my journey…

Meet Marnik Battryn

1. Who is Marnik? Meet Marnik, a cyber security consultant who has recently returned to his roots in the field after a successful career as a professional racing driver and coach.  Marnik's early career in cyber security was marked by…

Request demo: Securely and quickly connect external vendors managing your IT assets

Demo: securely and quickly connect external vendors managing your IT assets Provide fast, easy and secure privileged access for external vendors.Many businesses today rely on external vendors and remote employees to manage portions of their IT infrastructure. To successfully carry…