Talking about Security.

Follow the Qbit blog and learn more about our company, products & services, opinions and latest insights in security. All written by Qbitters.

All Blog Cases Events Press releases

Qbit

Comparison of IoT Security Frameworks

IoT frameworks have been devised that can help vendors in developing secure devices. These frameworks are helping vendors to create a secure device by containing security measures that can be followed during development

Sep 24, 20 / Blog.

Essential Requirements for Securing IoT Consumer Devices

Essential Requirements for Securing IoT Consumer Devices

Computers have become smaller, faster and cheaper, and that makes it possible to integrate them into all kinds of consumer devices. These Internet-of-Things (IoT) consumer devices are often insufficiently secure against cyberattacks.

Sep 17, 20 / Blog.

Qbit

The Most Important Security Problems with IoT Devices

In this article, we list the eleven most important security issues faced by IoT devices. We will review them from the most severe though to the least. It is worth noting that the six most severe issues were used in an actual attack, or to demonstrate proof-of-concept of a vulnerability.

Sep 10, 20 / Blog.

Kwetsbaarheid Windows Exchange servers (CVE-2020-16875)

Kwetsbaarheid Windows Exchange servers (CVE-2020-16875)

CVE-2020-16875 is 8 september 2020 bekend gemaakt via 'Microsoft Patch Tuesday'. Deze update informeerd over het probleem, het risisco en het advies.

Sep 9, 20 / Blog.

How to choose the most secure online conference tool for your organisation

How to choose the most secure online conference tool for your organisation

Online conference tools are obviously very convenient, especially during the coronacrisis. But there are some snags about virtual meetings. For example, how do you make sure that the data you share is well protected? Read more about it in this blog.

Jun 25, 20 / Blog.

Continuous monitoring of your network infrastructure by Qbit

Continuous monitoring of your network infrastructure by Qbit

The Qbit Security Monitor continuously monitors your network infrastructuur. In this blog you will read about our different modules and we give examples of vulnerabilities and risks that can occur in the systems of your organisation.

Jun 23, 20 / Blog.

Online hacktraining

Online hacktraining

In our online basic hacker training you travel through the hacking lab of Qbit under the guidance of our ethical hackers and discover the world of cyber security.

Apr 9, 20 / Blog.

Qbit Digital Testing hacks kids GPS watches for the Dutch Consumers' Association

Qbit Digital Testing hacks kids GPS watches for the Dutch Consumers' Association

Commissioned by the Consumers' Association in the Netherlands, our ethical hackers examined four popular GPS watches for children and found serious flaws.

Apr 2, 20 / Blog.

Part 1: Privacy, People Protected?

Part 1: Privacy, People Protected?

In the coming weeks, our privacy advisor Mathijs Hummel will take you into the intriguing world of privacy and the impact of the corona virus on that fundamental fundamental right. To clarify the right to privacy, we start this series with a reflective piece looking at the historical context.

Mar 31, 20 / Blog.

The fundamental right to privacy

The fundamental right to privacy

In the coming weeks, privacy advisor Mathijs Hummel will discuss the impact of the coronavirus on the fundamental right to privacy in a five-part series of articles.

Mar 31, 20 / Blog.

The world of cybersecurity is complex and rapidly evolving, we know. Qbit guides you. Feel free to contact us.

Contact us

Newsletter