Pentesting Stories: Errors and limited hygiene lead to full domain compromise

Full domain compromise from moving some of your customer-facing operations to a private cloud? Find out in this pentesting story!

Read more

Social engineering attacks – what you should know about them

Social engineering was present in the majority of the top ten attacks in 2018. Time for a behavioural analysis.

Read more

Finding the right integrator

General Manager Jo Vander Schueren explains what SecureLink does, what differentiates us and what motivates us to take certain decisions.

Read more

With over 15 years of experience, we are trusted by some of the world’s largest brands.
We are experts at designing, delivering, managing and supporting leading cyber security solutions.

Security Bootcamp 2019

Security Bootcamp brings together industry experts, cutting edge technology and the opportunity to network with your peers, in an iconic London location.

Read more

Cloud Security

Cloud gives you flexibility, scalability and agility. But how do you secure your processes? Understanding cloud-specific requirements allows you to plan, design, implement and run your cybersecurity program efficiently.

Read more

Managed detection & response.

Detecting and responding to todays world of evolving threats is a critical ability that requires continuous improvements. Do it right and your risk will decrease significantly and your productivity will go up. There is no such thing as 100% protection. Once you have accepted this statement it is time that you start adressing the threats you could not protect against with detection and response.

Read more