On-demand Webinar: Keeping your External Attack Surface Under Control! Watch now >>

Sweepatic Logo in white

These solutions partially overlap on some use cases, but in essence, they are not in competition with each other. In fact, they augment each other. The next question that is raised is: in which one should I invest first?

In our former blogpost, we announced Sweepatic is participating in the brand new, crowdsourced Trusted Fintech Program of our partner B-Hive. This unique program’s objective is to arm fintechs with cyber security knowledge, best practices, tools & techniques and solutions.

The World Cup is quite a conversation starter, to say the least. Football fan or not, everyone seems to show at least some interest in the Russian sports spectacle. That means a lot of traffic. To the many bars, parks and city squares that offer a big screen. And to the FIFA website.

By now, the term digital footprint shouldn't be a mystery anymore. We roll our eyes every time we see an old college colleague, our teenage niece or that guy on Facebook we don’t really know exposing half of their life online. “Are they not thinking about the dangers?” we think.

When checking the USA.gov domain we discovered a significant security gap which enabled us to take over their subdomain. Of course, we then secured it from hostile hackers and through coordination by the National CSIRT in the US we helped to make USA.gov aware of this significant security gap.

In this blog post we will provide you with an overview of the different aspects of the General Data Protection Regulation, as well as how Sweepatic can help your organization to comply before the enforcement day and stay compliant afterwards. Let's get started!

On October 25th the Belgian Cyber Security Convention gathers the Belgian cyber industry on a one-day conference in Mechelen. From big companies to startups, academia or public sector: all will be present to discuss recent cyber security trends and share their strategies.

We will set you up with all you need to know about Subdomain enumeration. Cyber attackers map out the digital footprint of the target in order to find weak spots to gain for example access to an internal network. Already know enough?