Pentesting Stories: Errors and limited hygiene lead to full domain compromise

Full domain compromise from moving some of your customer-facing operations to a private cloud? Find out in this pentesting story!

Read more

Social engineering attacks – what you should know about them

Social engineering was present in the majority of the top ten attacks in 2018. Time for a behavioural analysis.

Read more

Finding the right integrator

General Manager Jo Vander Schueren explains what SecureLink does, what differentiates us and what motivates us to take certain decisions.

Read more

With over 15 years of experience, we are trusted by some of the world’s largest brands.
We are experts at designing, delivering, managing and supporting leading cyber security solutions.

SMA report 2017

Security Maturity Assessment

SecureLink performed a research into the strengths and challenges of Europe’s leading cybersecurity teams. Understand how the priorities of your peers are shifting along with the changing threat landscape.

Read more

Secure the Cloud.

Cloud gives you flexibility, scalability and agility. But how do you secure your processes? Understanding cloud-specific requirements allows you to plan, design, implement and run your cybersecurity program efficiently.

Read more

Managed detection & response.

Detecting and responding to todays world of evolving threats is a critical ability that requires continuous improvements. Do it right and your risk will decrease significantly and your productivity will go up. There is no such thing as 100% protection. Once you have accepted this statement it is time that you start adressing the threats you could not protect against with detection and response.

Read more