Skip to main content
Need help with a cyber incident now?
Call 24/7: +31 88-2747800

Publications

Tesorion has a clear vision, we want to be relevant and contribute to a cyber-safe Netherlands. In addition, our experts visit our customers daily (in many cases virtually). During our activities and investigations we encounter new threats or the solution against them. It is precisely this knowledge that helps to improve cyber security, minimize and solve cybersecurity challenges. In short, we bundle all that information into different types of publications. We are happy to offer you these via this page.

Blog
21 April 2023

Roadmap to digitally resilient manufacturing

Industrial sector increasingly often victim of ransomware The industrial sector will significantly benefit from further digitalization. Data should be able to be shared easily to enable smart decision-making. And processes…
bescherming intellectual propertyBlog
21 April 2023

Protecting intellectual property requires substantial investment in security

International high-tech companies are increasingly often faced with aggressive attempts to steal their intellectual capital. After all, companies that are front-runners are, and will be, an attractive target for competition,…
Bewaking op het bedrijfsnetwerkBlog
13 April 2023

NDR: guarding the company’s network

Using modern Endpoint Detection and Response (EDR), you can detect and stop many different cyberattacks. EDR is therefore a logical step for a lot of organizations in improving their cybersecurity.…
in control zijn van uw dataBlog
1 February 2023

Being in control of your data: winning requires all of us

The expression above by Johan Cruijff, ‘Winning requires all of us’, applies to information security as well. As an organization, you want to get a grip (and keep it) on…
Blog
30 January 2023

Risk management: is a single framework sufficient?

Imagine, your home has a good lock on every outside door, a dog and a security system. Does that mean you don’t have to worry about burglary? That depends ……
Hoe gevaarlijk zijn úw ketenpartners? Een aanval op uw bedrijf via ketenpartners. Dat klinkt misschien vreemd, maar deze aanvalsstrategie wordt steeds vaker gebruikt. Wanneer een organisatie zelf niet direct kwetsbaar is, dan wordt er geprobeerd om binnen te komen via de zwakste schakel. In dit artikel kunt u lezen welke gevaren een bedrijf kan lopen wanneer een aanval als deze via ketenpartners plaatsvindt. https://www.tesorion.nl/nl/posts/hoe-gevaarlijk-zijn-uw-ketenpartners/ What risks do your supply chain partners pose? An attack on your business through supply chain partners. It may sound strange, but this attack strategy is becoming more common. When an organization itself is not directly vulnerable, an attempt is made to get in through the weakest link. In this article, you can read about the dangers that a company can face when an attack like this occurs through supply chain partners . https://www.tesorion.nl/en/posts/what-risks-do-your-supply-chain-partners-pose/Blog
27 January 2023

What risks do your supply chain partners pose?

Attacks on organizations by cybercriminals are increasingly often deployed through supply chain partners. This way of attacking is not a recent cyber threat, but it is one that is being…
Read more blogs
News
13 March 2023

Tesorion announces partnership with Qualys regarding vulnerability management

Leusden – Tesorion, the largest, 100% Dutch, independent cybersecurity service provider, chooses the cloud-based IT, security and compliance solution by Qualys. The goal is to unburden customers in the area of…
News
11 January 2023

Tesorion names Vectra as strategic partner for advanced detection and response

Immediately intervene in threats in Network, Identity and in SaaS and Cloud Environments Leusden – Tesorion, the largest, 100% Dutch, independent cybersecurity service provider, has named Vectra as strategic partner…
News
17 November 2022

Tesorion and Ploum enter partnership regarding cyber security advisory

Full-service law firm Ploum and cyber security service provider Tesorion have entered a strategic partnership. Ploum and Tesorion’s shared ambition is to make and keep organizations cyber secure. For this…
News
13 October 2022

Tesorion develops Vulnerability Explorer for Incident Response Teams

Software assigns priority to probability of exploitation of vulnerabilities Leusden, 13 October 2022 – Tesorion, the largest, 100 percent Dutch, independent cyber security service provider, has developed software for Incident Response Teams.…
News
8 September 2022

Tesorion chooses strategic partnership with Cybereason

Quick insight and adequate performance key in battle against cybercrime With the strategic partnership between Cybereason and Tesorion, Tesorion is taking the next step in realizing its growth strategy. Tesorion,…
News
29 June 2022

Tesorion announces partnership with KLDiscovery Ontrack for data recovery and eDiscovery

Data recovery essential to return to normal operations after a cyber incident as soon as possible Tesorion, the largest, 100% Dutch, independent cyber security service provider announces a partnership with…
Read more news
Vulnerability
24 May 2023

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
CERTSOCVulnerability
14 April 2023

QueueJumper – Microsoft Message Queueing vulnerability

This live blog contains information regarding vulnerabilities in the Microsoft Message Queuing service. As soon as we have an update, we’ll add it to this post. More information about possible…
Vulnerability
3 April 2023

3CXDesktopApp

This live blog contains information regarding the 3CXDesktopApp vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
CERTSOCVulnerability
16 March 2023

Microsoft Outlook zero-day vulnerability

This live blog contains information regarding the Microsoft Outlook zero-day vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
Microsoft Word RCE kwetsbaarheidCERTSOCVulnerability
14 March 2023

Fortinet RCE vulnerability

This live blog contains information regarding the Fortinet RCE vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details…
Microsoft Word RCE kwetsbaarheidCERTSOCVulnerability
7 March 2023

Microsoft Word RCE vulnerability

This live blog contains information regarding the Microsoft Word RCE vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
Read more vulnerabilities
Resources
22 July 2021

Onepager CISO as a Service

Time for a cybersecurity operator Flexible CISO Cybersecurity and an appropriate cybersecurity policy are dependent on many factors, such as the size of your organization, the processes and the extent…
Resources
18 July 2021

Onepager Pen testing

What if a hacking attempt occurs? Find the vulnerability Increase your digital resilience and protect your digital valuables. One day an actual incident takes place. You have already invested in…
Resources
18 July 2021

Onepager Digital Risk Protection

Do you know what? goes on out of sight ? Protect your crown jewels Undoubtedly, you monitor whether your business is mentioned in the media or on the internet. This…
Resources
18 July 2021

Retrospect Report #1

Tesorion sees an increase in cyber attacks When returning to the office In the Tesorion Retrospect we look back at the past year, one in which the coronacrisis has severely…
Resources
13 July 2021

Tesorion Technical Update

Would you like to receive critical vulnerabilities when known by e-mail from now on? Subscribe to Tesorion Technical Update.
Resources
8 July 2021

Industry paper awareness in healthcare

Voorkom datalekken door ervoor te zorgen dat elke medewerker weet wat belangrijk wanneer deze omgaat met persoons- of bedrijfsdata
Read more resources