Blogs

Blog

Don't let your software take you hostage

The fact that many companies lack an update policy isn’t fiction, it’s a fact. The National Cyber ​​Security Centre of Minister Grapperhaus’ own Ministry of Justice and Security, has been reporting about this for years in their Cyber ​​Security Assessment. But we also see this this happening in practice: updates and patches are outdated or not implemented at all.

Read more
Blog

From logging to value creation

Log management is one of the Secure Managed Services that Solvinity offers its customers. What is logging exactly and what’s the purpose for a customer?

Read more
Blog

CI/CD explained to SALES

CI/CD is difficult to explain to anyone who is unfamiliar with the world of software development and management. I discovered that this modern IT delivery process is in many ways comparable to the better known tendering or bidding process.

Read more
Blog

Increase your resilience with Continuous Hardening

No one is invulnerable. But a solid IT infrastructure should always be hardened against the most well-known and common types of digital abuse. At Solvinity, hardening is a continuous process.

Read more
Blog

Vulnerability management problems? Relax.

With the summer holiday period approaching, taking time off from work to relax and recuperate is in the mind of many. Whether it's the book you've been wanting to read, the latest Netflix must-watch box set to catch up or just the idea of doing nothing soaking up sun on a beach, likely you'll be thinking of ways to spend your time that absolutely do not relate to work. But an unexpected benefit is...

Read more
Security

The recipe for a resilient organisation

There seems to be something seriously wrong with the digital resilience of Dutch organisations. In the 2019 National Cyber Security Agenda, the National Coordinator for Security and Counterterrorism clearly states that “incidents could have been prevented and damage could have been limited if basic measures had been taken.” While the fear of ‘state actors’ and professional hackers is increasing, i...

Read more
Security

Are you invulnerable?

Today, optimal protection against organised digital break-in attempts or cyber crime syndicates is a need and necessity. Yet, many companies and government organisations do not have proper protection. More and more organisations are falling victim to 'casual cybercrime': casual hackers that jimmy the locks on digital doors until they find someone somewhere who missed the latest security update, di...

Read more
Blog

Compliance certification and standards: useful, necessary or an empty shell?

There are quite a few different certifications. ISO27001, ISAE3402, SOC2, ISO9001, ISO14001 BIR & BIG, Nen7510, PCI, and we could go on and on. All are important standards, indicating how processes should be structured and safeguarding the quality of services. For certain target groups, such as the financial or public sector, it is essential to comply with these certifications due to laws and regu...

Read more

Let us solve your problem

Call us on +31 (0)20 364 36 00 or send us an e-mail

ask your question