Tweets

You blocked @j_smets

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @j_smets

  1. 1 Oct 2019

    Handig, ... niet kunnen volgen ... 🤬

    Undo
  2. 29 May 2019
    Undo
  3. Retweeted

    In 2015 pictures leaked of TSA master luggage keys and CAD files were reverse engineered from them. Today I bought a chinese clone set on Amazon. It is laughable that anyone thinks governments are sophisticated enough to protect backdoors and master encryption keys.

    Show this thread
    Undo
  4. 28 Jan 2019

    Lessons for Corporate Boardrooms From 's Settlement 

    Undo
  5. 23 Jan 2019

    According to our 2018 State of Security report, 54% of consumers fear a lack of privacy with IoT devices. Download your FREE copy now!

    Undo
  6. 18 Jan 2019

    In a new article for , Jason Hart, CTO, Data Protection at Gemalto, discusses why security and confidence must go hand in hand

    Undo
  7. 17 Jan 2019

    Nearly Half of Organizations Can’t Tell If Their IoT Devices Were Breached, Finds Study. Gemalto's summarises the State of IoT Security report.

    Undo
  8. 16 Jan 2019

    Datalekken IoT-apparatuur vallen meeste bedrijven niet op - Bijna alle ondervraagde bedrijven willen meer overheidsbemoeienis.

    Undo
  9. 15 Jan 2019

    NEWS: Almost half of companies still can’t detect IoT device breaches, reveals Gemalto study.

    Undo
  10. 14 Jan 2019

    The Benefits of Using an External Key Manager (EKM) for Hyperconvergence. Gemalto's Jill Cygnarowicz writes for the   Community

    Undo
  11. 11 Jan 2019

    How are you preparing for new threats and in 2019?

    Undo
  12. 8 Jan 2019

    Cybersecurity trends 2019: What should you look out for? - As the threat landscape evolves, what trends and changes should you be aware of going into a new year?

    Undo
  13. 7 Jan 2019

    The Future of -  A 2019 Outlook. Thoughts from Gemalto's .

    Undo
  14. 4 Jan 2019

    Tech trends 2019: 'The end of truth as we know it?' Gemalto's features in  

    Undo
  15. 3 Jan 2019

    2019's First Data Breach: It Took Less than 24 Hours - 30,000 state governments details phished.

    Undo
  16. 2 Jan 2019

    Do you continuously verify users’ identities and enforce access management policies each time a user logs into a cloud application? Watch and learn how identity and access management works in the cloud.

    Undo
  17. 21 Dec 2018

    Just in time for your holiday road trip—part 3 of our series with is now live. CyberwireX: Risk and Regulation in the Financial Sector with inputs from and . also weighs in with our view.

    Undo
  18. 20 Dec 2018

    Identity & Access Management continues to be a key component in building an enterprise's cyber security strategy. Check out our brief review of IAM in 2018.  

    Undo
  19. 19 Dec 2018

    Data Protection on Demand Helps Orgs with HSM, & Key Management, Finds Test.

    Undo
  20. 18 Dec 2018

    A new Dutch-Belgian initiative is seeking to strengthen port security by harnessing the power of the Internet of Things ().

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·