Discover the benefits of DevSecOps and the shift left approach to security with ActWise expert, Jochen. Learn how integrating security from the beginning can minimize risks and reduce costs.
Introducing Arne, a cyber security consultant who is always up for an adventure.With a background in Applied Computer Sciences.
ActWise has received the 'Growth Partner of the Year for the North European region' award. This award is confirmation of the vision and drive within the company and the role that ActWise is trying to take in the cybersecurity world.
CyberArk EPM as an effective and efficient solution against cryptolockers
Talking Security: Why vishing is the new phishing, and how to prevent it! Welcome to the world of modern cyber threats, where even your phone calls aren't safe from the clutches of cunning hackers. In this blog, we dive into…
Embark on a journey to cybersecurity excellence with ActWise, your seasoned guide to privileged access management (PAM) and CyberArk implementation. In today's digital landscape, protecting sensitive assets is paramount, and ActWise provides tailored solutions to meet your unique needs.
Hello there! My name is Jochen Kerremans, a 27-year-old security consultant. I am part of the IS4U group for almost 5 years now and it has been a blast so far! Allow me to provide further insights into my journey…
1. Who is Marnik? Meet Marnik, a cyber security consultant who has recently returned to his roots in the field after a successful career as a professional racing driver and coach. Marnik's early career in cyber security was marked by…
Request your CyberArk DNA Scan What you can’t see you can’t protect. Therefore it is important to scan you network to gain visibility, locate all credentials and uncover vulnerabilities within your network. Request your CyberArk DNA scan today and take…
Download the CyberArk Remote Access datasheet CyberArk Remote Access is a SaaS solution to help organizations secure external vendors that require access to critical internal systems, without the need for VPNs, agents or passwords. Remote Access combines Zero Trust access,…