Skip to main content
Need help with a cyber incident now?
Call 24/7: +31 88-2747800

Publications

Tesorion has a clear vision, we want to be relevant and contribute to a cyber-safe Netherlands. In addition, our experts visit our customers daily (in many cases virtually). During our activities and investigations we encounter new threats or the solution against them. It is precisely this knowledge that helps to improve cyber security, minimize and solve cybersecurity challenges. In short, we bundle all that information into different types of publications. We are happy to offer you these via this page.

dreiging van de quantumcomputerBlog
24 August 2023

The threat of the quantum computer

It is like a race against an invisible opponent. You know he can overtake you. But you do not know when. How can you still win? Host Lex Borger speaks…
Cybersecurity beslaat de hele ketenBlog
21 August 2023

Cybersecurity covers the entire supply chain

It is known that your organization’s digital resilience is as strong as the weakest link. In times of digital transformation and digital supply chain processes being the norm, that weak…
IEC 62443Blog
8 June 2023

IEC 62443: what does it mean for you?

Introduction Nowadays, we are seeing that cyberattacks are increasingly often aimed at industrial environments and critical infrastructure. The impact of these attacks affects primary production processes of organizations and can…
RansomwaregroeperingenBlogCERT
8 June 2023

Ransomware groups and their methods

Companies and organizations are becoming increasingly aware of the danger presented by cybercriminals. The consequences of a cyber incident can be enormous for your business operations and with that, for…
innovatie en securityBlog
28 April 2023

Innovation and security must go hand-in-hand

Further digitalization and automatization of processes will enable work in the health care sector to be done more efficiently. This does mean however, that digital resilience will be put to…
beveiligen supply chainBlog
28 April 2023

Four ways to secure your supply chain

Supply chain management is becoming more and more important in the Netherlands. As a result of increasing automatization and the degree of information exchange between the different parties in the…
Read more blogs
Samenwerking-Qualys-TesorionNews
13 March 2023

Tesorion announces partnership with Qualys regarding vulnerability management

Leusden – Tesorion, the largest, 100% Dutch, independent cybersecurity service provider, chooses the cloud-based IT, security and compliance solution by Qualys. The goal is to unburden customers in the area of…
Samenwerking met VectraNews
11 January 2023

Tesorion names Vectra as strategic partner for advanced detection and response

Immediately intervene in threats in Network, Identity and in SaaS and Cloud Environments Leusden – Tesorion, the largest, 100% Dutch, independent cybersecurity service provider, has named Vectra as strategic partner…
Samenwerking met PloumNews
17 November 2022

Tesorion and Ploum enter partnership regarding cyber security advisory

Full-service law firm Ploum and cyber security service provider Tesorion have entered a strategic partnership. Ploum and Tesorion’s shared ambition is to make and keep organizations cyber secure. For this…
News
13 October 2022

Tesorion develops Vulnerability Explorer for Incident Response Teams

Software assigns priority to probability of exploitation of vulnerabilities Leusden, 13 October 2022 – Tesorion, the largest, 100 percent Dutch, independent cyber security service provider, has developed software for Incident Response Teams.…
News
8 September 2022

Tesorion chooses strategic partnership with Cybereason

Quick insight and adequate performance key in battle against cybercrime With the strategic partnership between Cybereason and Tesorion, Tesorion is taking the next step in realizing its growth strategy. Tesorion,…
News
29 June 2022

Tesorion announces partnership with KLDiscovery Ontrack for data recovery and eDiscovery

Data recovery essential to return to normal operations after a cyber incident as soon as possible Tesorion, the largest, 100% Dutch, independent cyber security service provider announces a partnership with…
Read more news
Google LibWebP code execution vulnerabilityCERTSOCVulnerability
2 October 2023

Google LibWebP code execution vulnerability

This live blog contains information regarding a vulnerability in Google LibWebP. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
Vulnerability
27 September 2023

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
CERTSOCVulnerability
25 August 2023

Ivanti Sentry API Authentication Bypass

This live blog contains information regarding a vulnerability in Ivanti Sentry. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
CERTSOCVulnerability
9 August 2023

Patch Tuesday – Microsoft Message Queueing

This live blog contains information regarding a vulnerability in Patch Tuesday - Microsoft Message Queueing. As soon as we have an update, we’ll add it to this post. More information…
CERTSOCVulnerability
8 August 2023

Ivanti Endpoint Manager Mobile Vulnerability

This live blog contains information regarding a vulnerability in Ivanti Endpoint Manager Mobile. As soon as we have an update, we’ll add it to this post. More information about possible…
CERTSOCVulnerability
1 August 2023

BeyondTrust PRA/RS vulnerability

This live blog contains information regarding a vulnerability in BeyondTrust PRA/RS. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
Read more vulnerabilities
Resources
22 July 2021

Onepager CISO as a Service

Time for a cybersecurity operator Flexible CISO Cybersecurity and an appropriate cybersecurity policy are dependent on many factors, such as the size of your organization, the processes and the extent…
Resources
18 July 2021

Onepager Pen testing

What if a hacking attempt occurs? Find the vulnerability Increase your digital resilience and protect your digital valuables. One day an actual incident takes place. You have already invested in…
Resources
18 July 2021

Onepager Digital Risk Protection

Do you know what? goes on out of sight ? Protect your crown jewels Undoubtedly, you monitor whether your business is mentioned in the media or on the internet. This…
Resources
18 July 2021

Retrospect Report #1

Tesorion sees an increase in cyber attacks When returning to the office In the Tesorion Retrospect we look back at the past year, one in which the coronacrisis has severely…
Resources
13 July 2021

Tesorion Technical Update

Would you like to receive critical vulnerabilities when known by e-mail from now on? Subscribe to Tesorion Technical Update.
Resources
8 July 2021

Industry paper awareness in healthcare

Voorkom datalekken door ervoor te zorgen dat elke medewerker weet wat belangrijk wanneer deze omgaat met persoons- of bedrijfsdata
Read more resources