‘The Real Risk of AI Lies in Not Adopting It,’ Says Our Insurance Industry Expert
For 2025 there are technology trends on the horizon the sector needs to keep in mind and start preparing for.
For 2025 there are technology trends on the horizon the sector needs to keep in mind and start preparing for.
How a scalable IT platform & managed service model enable insurers Marco Capital & Poloworks to focus on business growth. Discover in this customer story how Getronics helps drive digital transformation in the insurance industry.
A UK hospital has been hit in the latest NHS cyber attack, 2024. Are their security services up to standard?
Getronics will leverage the LogRhythm SIEM Platform by Exabeam for comprehensive log contextualization, enhanced threat detection, and a user-friendly interface.
Technology has seen an exponential rise over the last few decades. Both hardware and software has got more sophisticated, and faster, which means that cybersecurity has also become a sophisticated threat.
We deep dive into key strategic IT areas you can invest in to strengthen your resilience and get the most out of your IT investments. We’ll give you examples of key technical capabilities and best practices for each of the IT pillars we have identified as priorities in a resilience-oriented investment approach.
October is an incredibly important time for security providers. Not only is it Cyber-security month, but it marks the start date for the Network and Information Security Directive 2, or “NIS2”.
Read on to find out everything you need to know about DORA, shared from our Global Head of Operational Security, Rob Nidschelm.
This document is an essential guide to understanding and complying with the DORA and NIS2 regulations, ensuring the continuity and security of your business in an ever-changing environment. Download it to get detailed information and prepare adequately.
There is no excerpt because this is a protected post.
Business Continuity Management helps mitigate risks and ensure organisations can continue operating during a crisis, effectively building their resilience.
As AI accelerates, so too do the tactics of threat actors aiming to exploit financial systems, making the battle against fraud an ever-evolving front.
We explore the dangers of phishing attacks – and how you can minimise the risk of human error to keep your internal systems safer.
From new facilities of the Security Operations Centre in Barcelona and a reinforced team of 30 experts, the company provides 24×7 cybersecurity support to businesses worldwide
The contract spans 3 years of continuous, rigorous testing and cyber assessments, and is the first joint cybersecurity platform by Getronics and HUB Security. GetHUB 360 allows businesses to identify, mitigate and respond to evolving cyber threats in local, cloud, and hybrid computing environments.
In this article, you’ll see how the Getronics SOC uses diverse threat detection with the combination of the SOC Visibility Triad, the MITRE ATT&CK Framework and Threat Intelligence.
In an increasingly connected world, it is important to know how to protect information shared through video calls. Learn how to increase your level of security.
Cyber Europe is the largest cybersecurity drill held in the world and in its sixth edition, it was focused on testing the response to a possible attack on the infrastructure and services of the European health system.
The difference between security from an MSP and MSSP is the difference between putting on a padlock … and hiring a team of patrolling guards with dogs.
The certification allows Getronics to provide its services to the Spanish public sector in compliance with the most demanding and rigorous standards.
For 2025 there are technology trends on the horizon the sector needs to keep in mind and start preparing for.
How a scalable IT platform & managed service model enable insurers Marco Capital & Poloworks to focus on business growth. Discover in this customer story how Getronics helps drive digital transformation in the insurance industry.
A UK hospital has been hit in the latest NHS cyber attack, 2024. Are their security services up to standard?
Getronics will leverage the LogRhythm SIEM Platform by Exabeam for comprehensive log contextualization, enhanced threat detection, and a user-friendly interface.
Technology has seen an exponential rise over the last few decades. Both hardware and software has got more sophisticated, and faster, which means that cybersecurity has also become a sophisticated threat.
We deep dive into key strategic IT areas you can invest in to strengthen your resilience and get the most out of your IT investments. We’ll give you examples of key technical capabilities and best practices for each of the IT pillars we have identified as priorities in a resilience-oriented investment approach.
October is an incredibly important time for security providers. Not only is it Cyber-security month, but it marks the start date for the Network and Information Security Directive 2, or “NIS2”.
Read on to find out everything you need to know about DORA, shared from our Global Head of Operational Security, Rob Nidschelm.
This document is an essential guide to understanding and complying with the DORA and NIS2 regulations, ensuring the continuity and security of your business in an ever-changing environment. Download it to get detailed information and prepare adequately.
There is no excerpt because this is a protected post.
Business Continuity Management helps mitigate risks and ensure organisations can continue operating during a crisis, effectively building their resilience.
As AI accelerates, so too do the tactics of threat actors aiming to exploit financial systems, making the battle against fraud an ever-evolving front.
We explore the dangers of phishing attacks – and how you can minimise the risk of human error to keep your internal systems safer.
From new facilities of the Security Operations Centre in Barcelona and a reinforced team of 30 experts, the company provides 24×7 cybersecurity support to businesses worldwide
The contract spans 3 years of continuous, rigorous testing and cyber assessments, and is the first joint cybersecurity platform by Getronics and HUB Security. GetHUB 360 allows businesses to identify, mitigate and respond to evolving cyber threats in local, cloud, and hybrid computing environments.
In this article, you’ll see how the Getronics SOC uses diverse threat detection with the combination of the SOC Visibility Triad, the MITRE ATT&CK Framework and Threat Intelligence.
In an increasingly connected world, it is important to know how to protect information shared through video calls. Learn how to increase your level of security.
Cyber Europe is the largest cybersecurity drill held in the world and in its sixth edition, it was focused on testing the response to a possible attack on the infrastructure and services of the European health system.
The difference between security from an MSP and MSSP is the difference between putting on a padlock … and hiring a team of patrolling guards with dogs.
The certification allows Getronics to provide its services to the Spanish public sector in compliance with the most demanding and rigorous standards.
Founding and leading member of the Global Workspace Alliance
©2024 Getronics