Skip to main content
Need help with a cyber incident now?
Call 24/7: +31 88-2747800

Publications

Tesorion has a clear vision, we want to be relevant and contribute to a cyber-safe Netherlands. In addition, our experts visit our customers daily (in many cases virtually). During our activities and investigations we encounter new threats or the solution against them. It is precisely this knowledge that helps to improve cyber security, minimize and solve cybersecurity challenges. In short, we bundle all that information into different types of publications. We are happy to offer you these via this page.

in control zijn van uw dataBlog
1 February 2023

Being in control of your data: winning requires all of us

The expression above by Johan Cruijff, ‘Winning requires all of us’, applies to information security as well. As an organization, you want to get a grip (and keep it) on…
Blog
30 January 2023

Risk management: is a single framework sufficient?

Imagine, your home has a good lock on every outside door, a dog and a security system. Does that mean you don’t have to worry about burglary? That depends ……
Hoe gevaarlijk zijn úw ketenpartners? Een aanval op uw bedrijf via ketenpartners. Dat klinkt misschien vreemd, maar deze aanvalsstrategie wordt steeds vaker gebruikt. Wanneer een organisatie zelf niet direct kwetsbaar is, dan wordt er geprobeerd om binnen te komen via de zwakste schakel. In dit artikel kunt u lezen welke gevaren een bedrijf kan lopen wanneer een aanval als deze via ketenpartners plaatsvindt. https://www.tesorion.nl/nl/posts/hoe-gevaarlijk-zijn-uw-ketenpartners/ What risks do your supply chain partners pose? An attack on your business through supply chain partners. It may sound strange, but this attack strategy is becoming more common. When an organization itself is not directly vulnerable, an attempt is made to get in through the weakest link. In this article, you can read about the dangers that a company can face when an attack like this occurs through supply chain partners . https://www.tesorion.nl/en/posts/what-risks-do-your-supply-chain-partners-pose/Blog
27 January 2023

What risks do your supply chain partners pose?

Attacks on organizations by cybercriminals are increasingly often deployed through supply chain partners. This way of attacking is not a recent cyber threat, but it is one that is being…
Blog
23 January 2023

9 tips for preventing Business Email Compromise

As an experienced IT professional you are able to instantly spot phishing emails. But, sometimes a message appears in which everything just seems right: the names, contents, and the sender’s…
BlogNIS 2
20 January 2023

The three most important steps to prepare your organization for the NIS2 directive

Perhaps, and hopefully, you are already familiar with it, the current European Network and Information Security directive (NIS). It is possible you have heard of it before, but have not…
8 Tips om een veilig wachtwoord te makenBlog
24 November 2022

8 Tips for creating a secure password

24 November is ‘National Check Your Passwords Day. This day was created by Tweakers several years ago. Unfortunately it still is necessary to bring attention to strong passwords and proper…
Read more blogs
News
13 March 2023

Tesorion announces partnership with Qualys regarding vulnerability management

Leusden – Tesorion, the largest, 100% Dutch, independent cybersecurity service provider, chooses the cloud-based IT, security and compliance solution by Qualys. The goal is to unburden customers in the area of…
News
11 January 2023

Tesorion names Vectra as strategic partner for advanced detection and response

Immediately intervene in threats in Network, Identity and in SaaS and Cloud Environments Leusden – Tesorion, the largest, 100% Dutch, independent cybersecurity service provider, has named Vectra as strategic partner…
News
17 November 2022

Tesorion and Ploum enter partnership regarding cyber security advisory

Full-service law firm Ploum and cyber security service provider Tesorion have entered a strategic partnership. Ploum and Tesorion’s shared ambition is to make and keep organizations cyber secure. For this…
News
13 October 2022

Tesorion develops Vulnerability Explorer for Incident Response Teams

Software assigns priority to probability of exploitation of vulnerabilities Leusden, 13 October 2022 – Tesorion, the largest, 100 percent Dutch, independent cyber security service provider, has developed software for Incident Response Teams.…
News
8 September 2022

Tesorion chooses strategic partnership with Cybereason

Quick insight and adequate performance key in battle against cybercrime With the strategic partnership between Cybereason and Tesorion, Tesorion is taking the next step in realizing its growth strategy. Tesorion,…
News
29 June 2022

Tesorion announces partnership with KLDiscovery Ontrack for data recovery and eDiscovery

Data recovery essential to return to normal operations after a cyber incident as soon as possible Tesorion, the largest, 100% Dutch, independent cyber security service provider announces a partnership with…
Read more news
Vulnerability
30 March 2023

3CXDesktopApp

This live blog contains information regarding the 3CXDesktopApp vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
Vulnerability
29 March 2023

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
CERTSOCVulnerability
16 March 2023

Microsoft Outlook zero-day vulnerability

This live blog contains information regarding the Microsoft Outlook zero-day vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
Microsoft Word RCE kwetsbaarheidCERTSOCVulnerability
14 March 2023

Fortinet RCE vulnerability

This live blog contains information regarding the Fortinet RCE vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details…
Microsoft Word RCE kwetsbaarheidCERTSOCVulnerability
7 March 2023

Microsoft Word RCE vulnerability

This live blog contains information regarding the Microsoft Word RCE vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
CERTSOCVulnerability
27 December 2022

FortiOS heap-based buffer overflow vulnerability

This live blog contains information regarding the FortiOS heap-based buffer overflow vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks…
Read more vulnerabilities
Resources
22 July 2021

Onepager CISO as a Service

Time for a cybersecurity operator Flexible CISO Cybersecurity and an appropriate cybersecurity policy are dependent on many factors, such as the size of your organization, the processes and the extent…
Resources
18 July 2021

Onepager Pen testing

What if a hacking attempt occurs? Find the vulnerability Increase your digital resilience and protect your digital valuables. One day an actual incident takes place. You have already invested in…
Resources
18 July 2021

Onepager Digital Risk Protection

Do you know what? goes on out of sight ? Protect your crown jewels Undoubtedly, you monitor whether your business is mentioned in the media or on the internet. This…
Resources
18 July 2021

Retrospect Report #1

Tesorion sees an increase in cyber attacks When returning to the office In the Tesorion Retrospect we look back at the past year, one in which the coronacrisis has severely…
Resources
13 July 2021

Tesorion Technical Update

Would you like to receive critical vulnerabilities when known by e-mail from now on? Subscribe to Tesorion Technical Update.
Resources
8 July 2021

Industry paper awareness in healthcare

Voorkom datalekken door ervoor te zorgen dat elke medewerker weet wat belangrijk wanneer deze omgaat met persoons- of bedrijfsdata
Read more resources