| ictu-sr.nl | Stichting ICTU | Access to the system is restricted to persons explicitly authorized by Stichting ICTU. Use of this system implies consent to the Information Security Policy of Stichting ICTU. Vulnerabilities can be reported via Coordinated Vulnerability Disclosure (CVD). | Information Technology → IT Security 980 | authorization 32 vulnerability 149 policy 2149 | |
| ingeniousminds.nl | Ingenious Minds | The website describes the experience and approach of Hans, a recruiter specializing in finding the right professionals in cloud, infrastructure, DevOps, and networking for tech companies. The website highlights the challenges that tech companies face when attracting technical specialists and explains the need for a human-centered approach in recruitment. The site promotes specific services such as finding experts in cloud solutions, matching network specialists and fostering DevOps collaboration. | Software & Computing → Cloud Computing 1253 | scale-ups 27 devops 197 startup 376 networking 842 cloud 1527 professionals 1966 | |
| appeltaarters.nl | ClouDNS | The website directs users to register their domain name as a DNS zone within their account, and advises to wait for DNS propagation if already registered. It explains what DDoS attacks are - distributed denial-of-service attacks that overwhelm a target with traffic from multiple sources, potentially affecting computers, networks, or DNS systems. The website recommends implementing DDoS protection through a DNS hosting provider's add-on service and lists various DNS services offered by ClouDNS, including DDoS Protected DNS, VPS Monitoring, and SSL certificates. | Computer Science → Networking 809 | dns 74 protection 728 | |
| gentlesource.nl | GentleSource | The website covers topics such as artificial intelligence, cybersecurity, green technology, and online marketing, focusing on their impact on the creative industry and the digital world. Articles are also presented on cloud strategies, product information management, and tips for learning the Arabic language. The website offers news and analyses on the latest developments and trends in the tech industry and sustainability, with an emphasis on practical applications and strategic considerations. | Information Technology → Data Management 827 | product information 13 cybersecurity 688 cloud 1527 ai 2181 seo 3707 sustainability 18451 | Haarlemmermeer → Hoofddorp 2739 |
| kryo.nl | Kryo | Kryo advises clients in the IT field and identifies weaknesses in their IT departments and organizations. The company provides support in creating plans to address these weaknesses, including developing multi-year budgets and cloud roadmaps. Kryo primarily focuses on organizations in the (semi)public sector, such as government agencies, municipalities, and the healthcare sector. | IT → Management 346 | budget 1335 cloud 1527 it 1539 plan 2566 | |
| cybersecurity-escaperoom.nl | Cyber Security Escape Room Online | The game offers 25 learning moments about cybersecurity, applicable in both office and home working environments. The training is available in multiple languages, including Dutch, English, German, Spanish, and Italian. The training runs entirely in the cloud and is compatible with various web browsers, offering different difficulty levels and customization options. | Training → Corporate Training 1331 | escape room 430 cybersecurity 688 game 2807 training 28133 | |
| borsuk.nl | Aftermarket.pl | The website facilitates the registration and sale of over 90,000 domains through its marketplace. Aftermarket.pl boasts a large customer base, managing over 410,000 domains for approximately 110,000 customers. The company emphasizes competitive pricing, advanced domain security, effective drop-catching strategies, and a comprehensive API for domain management and hosting. | Web Design & Development → Web Services 413 | registrar 18 api 276 marketplace 293 domain 1811 hosting 3125 security 6655 | |
| go-forward.nl | Go Forward | Founded in 2005, Go Forward specializes in practical information security, offering services such as security assessments and web application penetration tests. The company's approach is tailored to each client's specific needs, focusing on providing a relevant security perspective for their business. Go Forward utilizes widely acknowledged standards and procedures while maintaining a pragmatic and objective methodology. | Information Technology → IT Security 980 | assessment 1205 consultancy 2596 security 6655 training 28133 | |
| varese.nl | 't Huis Varese | The website emphasizes that the organization is driven by ‘the nerves’ of good food, which ensures a sharp and vision-oriented approach. 't Huis Varese offers a multidisciplinary approach, where development, design, and investment are combined under one roof and reinforced throughout the process. Patricia Knaap describes her approach as based on creativity, analysis, and a holistic view of the design and process, aimed at exceeding the expectations of the client. | | investment 2070 creativity 2531 risk 2896 real estate 4981 design 27202 | |
| cyberhub.nl | CyberHub | CyberHub comprises various components, including the National Cyber Security Centre (NCSC), the Defense Cyber Command, the AIVD (Intelligence and Security Service), and the Joint Sigint Cyber Unit. The NCSC operates as an expert, working to ensure the digital security of the Netherlands, while the Cyber Command focuses on defense, intelligence, and attack within the Defense Organization. The term CyberHub was proposed in 2019 by the Cyber Security Council as a collaboration body to foster cooperation between government agencies. | | defense 121 | |
| beyondideas.nl | Beyond Ideas | The website focuses on a cybersecurity mindset, which goes beyond technical measures and requires adoption by the entire organization. Beyond Ideas offers various services, including implementation of BIO, CISO as a Service, DORA, ISO 27001 and NEN 7510, as well as services such as Network and Information Security 2 (NIS2), Security Due Diligence and Third Party Risk Management. The company emphasizes the personalized approach of its specialists, who use practical experience and a critical perspective to offer effective solutions. | Insurance & Risk → Risk Management 1060 | cybersecurity 688 implementation 1029 certification 3380 | |
| njoyit.nl | Njoy IT | Njoy IT analyzes client issues and strategies to provide ICT management level advice and translate it into practical solutions for people, resources, and the organization. The company is a network organization that acts as a link between clients, employees, freelancers, and other service providers. Njoy IT positions itself as a partner for the client, with the ambition to provide the best service, for example, through contract management and the provision of the right resources. | Construction & Maintenance → Procurement Consulting 250 | detachering 18 contract management 210 ict 1049 consultancy 2596 | |
| techconsultinggroup.nl | Tech Consulting Group | The organization, known as TCG, acts as the only student association in Europe connecting technological skills with business insights. TCG participated in the Reshape Work Conference 2024, attracting industry leaders to explore the future of work and technology. The consultancy advises technology firms across various sectors – including IoT, AI, and Supply Chain – on strategic business matters, leveraging talented students and professional training. | Financial Services → Blockchain 251 | blockchain 250 consulting 3639 partner 4272 technology 6816 student 7623 | South-Holland → Rotterdam 25048 |
| wesleyluth.nl | Wesley Luth | The website features sections dedicated to project management, cybersecurity, CryptoWezz, and coaching, suggesting a multi-faceted business offering. It provides a range of services, including branding design, graphic design, web development, and portfolio creation, catering to diverse client needs. The website includes client testimonials, highlighting the ease of use of Astra templates, and emphasizes the company's focus on helping teams build their business dreams. | Online & Digital → Internet Services 1004 | branding design 12 cybersecurity 688 web development 965 project management 3423 coach 25810 | |
| prohotelextended.nl | MansionPlay | The narrative describes how DuckieTM, initially presented as a helpful individual, secretly exploited security vulnerabilities in MansionPlay's systems to steal their code and assets. He then publicly displayed the stolen assets on a Discord server, falsely claiming them as his own creations and even integrating the code into a new project. The story highlights the importance of security and the devastating consequences of misplaced trust within the digital asset management community. | | code 509 asset 591 trust 1147 security 6655 | |
| vinceste.nl | Vinceste IT | The website offers various services including hosting, software design, and consultancy for software development cycles. Vinceste caters to diverse client needs, providing tailored hosting solutions for small and medium-sized companies, exemplified by clients like Kevercentrum webshop and Altipo. The company’s hosting packages – Basic, Pro, and Premium – are designed to suit different business requirements, offering domain registration, email services, and SSL certificates. | IT → Managed Services 720 | ssl certificate 89 domain 1811 consultancy 2596 hosting 3125 software 8291 | |
| security-netwerk.nl | Fortinet | Network security is crucial in today’s digital world, protecting data and playing a key role in the operation of businesses. Insufficient network security, such as the case of a bank, can lead to financial damage and the uncontrollable leaking of data. Organizations must constantly update their security protocols to respond to the increasing complexity of digital threats and prevent potential operational disruptions. | Information Technology → Network Security 85 | threat 62 data 5872 security 6655 network 11123 | |
| bureaudekreek.nl | bureaudekreek.nl | The website highlights the problem of the ‘Cloud Act’ and the lack of attention in the Netherlands to the extraterritorial legislation of the United States. The website describes the transition to plain-HTML due to the risks associated with the ‘Cloud Act’ and the supplier’s relocation to a US entity. The website emphasizes the advanced systems and protocols used to utilize cloud services outside the reach of the ‘Cloud Act’ and promises a cloud setup free from the risks of this legislation soon. | Business Software → Compliance Software 19 | compliance 506 cloud 1527 hosting 3125 data 5872 security 6655 | |
| ccsecurity.nl | CC Security | CC Security began in June 2022 with the goal of advising organizations on information security, emphasizing culture, knowledge, innovation, and entrepreneurship. Companies often fail to realize that hackers are actively targeting them, planning their attacks carefully, which can lead to business disruption and data breaches. A vulnerability scan can help identify security vulnerabilities and implement concrete measures to address them. | Insurance & Risk → Risk Management 1060 | scan 790 it 1539 risk 2896 security 6655 | |
| itpedia.nl | ITpedia | Stakeholder complexity poses an increasingly significant challenge in IT projects, requiring careful management of diverse interests and expectations. A smart procurement process is crucial for a successful IT project, emphasizing the need to choose a strategic partner that meets not only technical requirements but also fosters a strategic alliance. QR codes, while convenient for various applications, represent a potential risk due to the popularity of cybercriminals exploiting them. | Entrepreneurship & Business → Corporate Social Responsibility 215 | qr-code 49 stakeholder 431 procurement 493 | |
| 2zz.nl | 2zz | The website regularly publishes articles on topics such as artificial intelligence, cybersecurity, energy and sustainability, and quantum technology. Articles cover a range of topics, including the relationship between AI and human creativity, the differences between zero-trust and traditional cybersecurity, and the rise of wearable and digital health trackers. The site provides updates on topics such as generative AI in education and the ethical implications of deepfakes. | Fashion → Trends 355 | blockchain 250 artworks 460 cybersecurity 688 ai 2181 data 5872 | |
| techzine.nl | Techzine | The platform provides updates on innovative products and services, and in-depth information to better understand them. Techzine covers various topics such as analytics, applications, cybersecurity and data management. The website also offers news about conferences like RSAC 2025 and related security platforms, and recent attacks such as the Microsoft SharePoint attack. | Software & Computing → Computing 696 | attacks 12 cybersecurity 688 conference 763 news 15293 | |
| pkioverheid.nl | PKIoverheid | The site publishes Root-, intermediate- and TSP-certificates issued by PKIoverheid, as well as the associated Certificate Policy (CP), Certificate Practice Statement (CPS) and Certificate Revocation Lists (CRL). Additionally, the website offers information on Object Identifiers (OID’s) and refers to the Logius website for more detailed information on certificate requests and TSP accession. PKIoverheid functions as a digital passport for computers and users, enabling secure and reliable data exchange and preventing misuse. | Government & Administration → Digital Government 86 | certificate 1036 infrastructure 1460 policy 2149 | |
| dev-new.nl | Not specified | One article from May 21, 2025, describes personal experiences with a gastric balloon and the journey to a healthier life. An article from April 9, 2025, explores the importance of vulnerability management in the context of digital security, particularly for young tech enthusiasts and developers. Various articles cover topics such as sports supplements, self-scanning in stores, the comparison between laptops and PCs, mood management with herbs, choosing bracelets for men, and the use of pellet stoves. | Computer → Computer Repair 898 | sport supplement 10 pellet stove 182 cybersecurity 688 bracelet 1053 laptop 1320 | |
| hcss.nl | The Hague Centre for Strategic Studies | The organization transforms global security issues into actionable solutions for both private and public clients. The website features various content sections including news, columns, reports, events, podcasts, and publications covering a wide range of strategic topics. Key areas of focus include geopolitical analysis, emerging technologies, cybersecurity, and transnational organized crime, alongside specific initiatives like the Knowledge base on Russia and the Indo-Dutch Cyber Security School. | International Cooperation Projects → International Relations 465 | geopolitics 23 threat 62 cybersecurity 688 analysis 1615 security 6655 research 8967 | South-Holland → The Hague 19898 |
| ncsc.nl | National Cyber Security Centre | The website offers information on cybersecurity advisories, relevant legislation such as the NIS2 directive, and basic principles for digital resilience. The NCSC describes the crucial role of digital infrastructure for vital services in the Netherlands and offers solutions to secure it. The site also includes a blog with expert advice, case studies of vulnerabilities (such as in Microsoft SharePoint and Citrix), and a digital cybersecurity portal called MijnNCSC. | Military Affairs → Defense 31 | digital resilience 13 vulnerability 149 cybersecurity 688 | |
| axians.nl | Axians | The website provides information about Axians' services, including digital transformation, cloud & data center infrastructure, cyber security, data analytics, digital workspace, and enterprise networks. The company focuses on ambitious clients and offers expertise in diverse market segments such as banking & insurance, government, retail, hospitality, industry, logistics, media, education, service providers, and transportation. Axians emphasizes the importance of human connection, knowledge sharing, and collaboration with clients and partners to accelerate innovation and effectively address digital challenges. | Civil & Infrastructure → Network Infrastructure 17 | data analytics 63 digital transformation 215 cybersecurity 688 cloud 1527 network 11123 | |
| maris.nl | Maris B.V. | The company specializes in Marine and Ocean Data Management services and networks across Europe, often participating in EU-funded projects to harmonize access to marine data. Maris also operates as an electronic publisher for two peer-reviewed online legal journals – Transnational Dispute Management (TDM) and Oil, Gas and Energy Law (OGEL) – collaborating with legal experts globally. Furthermore, Maris has extensive experience in creating responsive websites and applications to cater to users accessing content through smartphones and tablets. | Community → Government & Administration 10567 | data management 83 journal 294 application 3377 data 5872 | |
| pkipartners.nl | PKIpartners | The website offers information on various types of PKI certificates, including professional certificates, digipoort certificates, and gambling certificates. PKIpartners supports various government agencies and applications, such as DiginBFT, the Kansspelautoriteit Cruks, and the Unified Patent Court. The website provides services around applying, installing and managing PKI certificates, including transition advice and guidance for tendering. | Government & Administration → Digital Government 86 | digital signature 10 tender 329 certificate 1036 | |
| studsec.nl | StudSec | The association hosts workshops and tutorials across various cybersecurity sectors and provides mentorship from industry professionals. StudSec aims to empower students with no prior knowledge by offering accessible basic workshops and fostering a safe and inclusive community. Originally founded by two students in 2021, StudSec has grown to over 400 members with diverse skill levels and organizes bi-weekly events and training sessions. | Student Life → Students 352 | mentorship 414 cybersecurity 688 student 7623 community 7931 workshop 19325 event 45199 | |
| securitymanagement.nl | Security Management | The platform includes a digital magazine, website, newsletter, and various whitepapers. The site covers diverse security topics such as security, cybersecurity, fire safety, personal security, surveillance cameras, and access control, as well as sectors like healthcare, education, and logistics. Security Management also offers job vacancies, an agenda, training opportunities, and news about topics such as facial recognition, SOBA’s 35th anniversary, and the increasing threat of sabotage by state actors. | Information Technology → Business Technology 38 | whitepaper 116 cybersecurity 688 job vacancies 1241 sector 1332 security 6655 news 15293 | |
| divd.nl | DIVD | DIVD operates through a coordinated vulnerability disclosure program, proactively scanning the internet for vulnerabilities and responsibly reporting them to vendors. The organization emphasizes an open, honest, and collaborative approach, offering its services for free and maintaining a global reach. DIVD's activities include tracking and documenting cases of reported vulnerabilities, collaborating with various organizations, and showcasing its work through testimonials from industry experts. | Information Technology → IT Security 980 | vulnerability 149 case 1153 report 4551 security 6655 collaboration 16036 | |
| vpnnederland.nl | VPN Nederland | The website provides various features, including advanced VPN protocols, global servers, and apps for Windows, Mac, iOS, and Android. Users can take advantage of a temporary summer discount of 60% and unlimited device support for only €3.99 per month. The platform offers protection, privacy, and digital freedom by encrypting data and keeping online activities private, regardless of location or connection. | Security → VPN 54 | vpn 167 protocol 237 server 1036 subscription 3287 app 4595 data 5872 | |
| reconi.nl | Reconi | The website offers various eHerkenning certificates, including EH2, EH2+, and EH3, with different features and prices. Reconi emphasizes fast delivery, a simple application process, and competitive pricing and is the best-rated supplier according to reviews. The website warns about fake emails and SMS messages that fraudulently use eHerkenning and offers a step-by-step guide for requesting eHerkenning. | Online & Digital → Digital Services 1008 | certificate 1036 application 3377 | |
| privacyzeker.nl | Privacy Zeker | Privacy Zeker focuses on assisting SMEs in meeting the requirements of the AVG/GDPR privacy legislation, tailored to their specific needs. The website offers various services including a subscription, e-learning, a data protection officer, a certificate, cyber insurance, and a knowledge base. Privacy Zeker is the largest AVG and privacy service provider in the Netherlands, and also provides a helpdesk with privacy experts and a free AVG check. | Information Technology → IT Security 980 | avg 145 check 181 sme 466 privacy 1286 subscription 3287 | |
| crisismanager.nl | Crisismanager | The online magazine covers topics such as crisis management, crisis communication, and BCM, including developments and best practices. The website offers information about setting up crisis plans, training exercises, and job postings for crisis specialists. Various articles and interviews are included, such as one about the Tactical Coordination Centre Police Military Threat (TCCP-MD) and one about preparations for cyberattacks and potential military threats. | Information Technology → IT Security 980 | cyberattack 21 crisis 358 police 480 plan 2566 job 2795 training 28133 | North-Brabant → Eindhoven 11845 |
| butasbureau.nl | Butasbureau.nl | The company offers a variety of IT services, including corporate hosting, website SEO optimization, software engineering, and WordPress development. In addition to standard IT services, they provide cloud and file-share services, as well as graphic and web design services, and a photo service. Butasbureau.nl has both an Asian and a European office located in Kuwait and Belgrade, respectively. | Staffing & Recruitment → Technical Staffing 395 | software engineering 82 cloud services 198 hosting 3125 wordpress 3551 seo 3707 design 27202 | |
| virtuhost.nl | Virtuhost | The website is currently under construction and will be renewed soon with a new version. Virtuhost offers various web hosting services, including domain registration, SSL certificates, cloud storage, and anti-spam filters. The website also provides services such as website migration, domain name migration, managed WordPress hosting, server assistance, and email migration. | Web Hosting → Hosting Providers 1075 | cloud storage 44 ssl certificate 89 webhosting 948 domain 1811 wordpress 3551 | |
| securify.nl | Securify | The website describes Securify as a company specializing in cyber security, offering services such as penetration testing, red teaming, and Agile Security. Securify emphasizes a risk-based approach with ‘reality checks’ to continuously map the risks of organizations and determine how security can be improved. The company states that prevention is always better than cure and that ensuring online presence and data protection is essential without hindering the organization's speed or progress. | Information Technology → IT Security 980 | penetration testing 43 resilience 1091 risk 2896 | |
| ictrecht.nl | ICTRecht | The company offers services such as legal advice, privacy and security assessments, implementation of legal and regulatory frameworks, and risk management. ICTRecht also supports with drafting and reviewing contracts, implementing software such as GRC tooling and AI applications, and offering various training and education programs. The website provides knowledge bases, news, research, and podcasts on the legal and technical aspects of digital transformation, including AI, privacy, and cybersecurity. | Law → IT Law 17 | legal advice 888 privacy 1286 ai 2181 contract 2415 security 6655 | |
| kaspersky.nl | Kaspersky | Kaspersky is a global leader in cybersecurity, offering various products such as Kaspersky Premium, Kaspersky Plus, Kaspersky Standard, and Kaspersky Safe Kids. The website provides different options for business customers, including license extensions, a partner portal, an SMB license portal, and the ability to find partners. Kaspersky also offers a VPN, a password manager, and cloud console solutions, and focuses on providing cybersecurity for various platforms such as Windows, macOS, Android, and iOS. | Security → Antivirus 16 | cybersecurity 688 license 1288 partner 4272 | |
| cloudbear.nl | Cloudbear | Cloudbear takes the management, monitoring, and optimization of customers’ infrastructure out of their hands, offering a scalable and reliable solution. The website contains information about Cloudbear’s services, including case studies, blogs about monitoring and checklists for building scalable applications. Cloudbear positions itself as a partner for developers and companies, focusing on long-term collaborations and personalized support. | Software Development & Engineering → DevOps 429 Software & Computing → Cloud Computing 1253 | developer 406 monitor 1063 partnership 1407 infrastructure 1460 hosting 3125 application 3377 | Geldrop-Mierlo → Geldrop 794 |
| guardian360.nl | Guardian360 | The company offers a range of services, including vulnerability scanners, intrusion detection, and compliance solutions. The website presents success stories and case studies to illustrate the value of their platform and expertise. Guardian360 is ISO 27001-certified and provides 360° visibility of the IT infrastructure, supporting IT service providers and organizations with critical infrastructure. | Financial Services → Compliance 399 | vulnerability 149 compliance 506 cybersecurity 688 insights 976 partner 4272 | |
| qdoc.nl | Qdoc | The website offers a wide range of services including print and scan solutions, cloud management, online workplaces, business telephony, network management, cybersecurity services, and hosting. Qdoc also provides specific cybersecurity audits, pentesting, darkweb screening, and cybersecurity awareness training to protect businesses from digital threats. The website emphasizes providing worry-free document flows and efficient document management processes through expert advice, high-quality equipment, smart software solutions, training, and proactive service. | | cybersecurity 688 cloud 1527 document 1678 print 5511 software 8291 network 11123 | North-Brabant → Eindhoven 11845 |
| cyberstatus.nl | CyberStatus | CyberStatus caters to both SMEs and larger organizations, providing services to identify vulnerabilities in systems and websites. The company offers a scan service through partners, allowing service providers to inform their clients about the risks they face, strengthening customer loyalty. CyberStatus is an initiative of ThreadStone Cyber Security, a Dutch company specializing in protecting business networks and websites from cybercrime, in collaboration with government and businesses. | Information Technology → IT Security 980 | service provider 225 scan 790 risk 2896 security 6655 | South-Holland → Rotterdam 25048 |
| security.nl | Security.NL | The Consumer Association (Consumentenbond) is advocating for Microsoft to continue offering free security updates for Windows 10 after the official support ends on October 14th. Hundreds of Microsoft SharePoint servers have been compromised by attackers in recent days, according to security firm Eye Security and confirmed by the National Cyber Security Centre (NCSC). The website also features forum discussions on various cybersecurity-related topics, including VPN providers, privacy, malware, and misuse of systems. | Technical → Security 408 | malware 41 sharepoint 83 vpn 167 forum 1362 window 2030 | |
| raffel.nl | Raffel | Raffel specializes in delivering complex IT solutions and hosting services, including IT management, security, cloud services, and internet solutions. The company offers various services, such as a free pentest, cloud services accessible remotely, and cybersecurity solutions to protect businesses from cyberattacks. With over 15 years of experience, Raffel provides personalized service and proactive management, making them a reliable partner for businesses with complex IT needs. | Information Technology → IT Security 980 | pentest 17 it management 150 cloud services 198 cybersecurity 688 hosting 3125 data 5872 | |
| digitaltrustcenter.nl | Ministry of Economic Affairs and Climate | The website presents five basic principles for improving the cybersecurity resilience of organizations, including identifying risks and protecting systems. Information is provided on various cybersecurity-related topics, such as ransomware, phishing, and cloud security, and potential threats like DDoS attacks and data leaks. The Digital Trust Center facilitates collaboration with other organizations and offers support to entrepreneurs in improving their cybersecurity, referencing subsidies and examples of successful implementations. | Government & Administration → Dutch Government 114 | incident 335 cybersecurity 688 risk 2896 data 5872 collaboration 16036 | |
| analystict.nl | Analyst ICT | Analyst ICT makes a personal approach to IT services and automation possible through understandable explanations and custom solutions. The website offers a range of services, including workplace management, hardware and software management, cloud services, consultancy, cybersecurity, telephony & connectivity, and print solutions, as well as a Security Operations Center. Analyst ICT is recognized as a Microsoft Solutions Partner and regularly covers news about cybersecurity vulnerabilities and software updates, such as the zero-day vulnerability in SharePoint Server and the iOS update. | IT → Managed Services 720 | microsoft 183 cloud services 198 cybersecurity 688 it 1539 consultancy 2596 automation 2682 | |
| webmethod.nl | Webmethod | The company transforms ideas into real web applications, handling all associated tasks to alleviate client concerns. Webmethod offers a comprehensive range of services including full-stack development, cybersecurity, and specialized solutions like penetration testing and zero-trust architecture. Clients have reported high satisfaction with Webmethod's technical expertise, communication, and ability to deliver measurable results through innovative strategies and advanced technology. | IT → System Administration 610 | web application 609 cybersecurity 688 integration 1451 technology 6816 | Netherlands → Groningen 23734 |
| vdwaals.nl | SVTN "J.D. van der Waals" | The website includes sections for books, calendar events, activities, association governance, and historical information. Recent news and updates are featured, including a cybersecurity alert regarding the association's systems and details about upcoming events like the d-fine lunch lecture, Orion workshop, and Eindhoven Physics Symposium. The site also promotes the Study Tour Abroad 2025 to Japan, encouraging registration among SVTN "J.D. van der Waals" members. | Software & Computing → Cryptography 13 | cybersecurity 688 registration 4366 association 8562 member 10154 | |
| pn.nl | PN.NL | PN.NL was founded in 1995 with a background in the IT industry and has 35 years of expertise. The website describes solutions for various operating systems (Windows, Linux, Mac OSX) and the integration of email platforms such as PN Email, Axigen, and SpamProtector. PN.NL partners with companies like Imunify360, MailStore, Xelion, and TransIP to offer comprehensive IT services and security measures. | IT → Managed Services 720 | it consultancy 52 backups 83 cybersecurity 688 webhosting 948 email 1012 server 1036 | |
| veermanict.nl | Veerman ICT | Veerman ICT serves as a strategic partner, assisting companies with preparing for future IT challenges, working alongside clients to consider and implement IT policies. The website offers various services, including secure workplaces, backups, servers, cloud environments, email security, and network security, aimed at protecting data and IT infrastructure. Furthermore, Veerman ICT provides expertise and support related to the Digital Operational Resilience Act (DORA) and describes the benefits of their collaboration, such as the development and application of new techniques, broad experience in Modern Workplace, and a high level of knowledge. | IT → Network Management 702 | dora 15 it management 150 infrastructure 1460 cloud 1527 security 6655 | |
| mitservices.nl | M-IT Services | The company provides various services including risk analyses, cyber assessments, system management and IT consulting, with the slogan 'Digitally Safe in 39 Days'. The website presents various products such as ‘Always Safe in Operation’, ‘Cyber Threat Assessment’ and ‘ICT Quickscan’ and offers training opportunities such as a ‘5-Minute Online Training’. M-IT Services adopts a step-by-step approach: first mapping the situation, then ensuring digital security, and finally enabling more efficient teamwork without IT worries. | Information Technology → Business IT 102 | it 1539 risk 2896 security 6655 | |
| gflex.nl | Gflex | The company offers 24/7 support and is ISO 27001-certified, highlighting their commitment to security and reliability. Gflex focuses on providing simple and transparent ICT solutions, allowing clients to concentrate on their own work. The website presents various services, including ICT management, server management, cybersecurity, and cloud services, emphasizing their personalized approach and flexible solutions. | IT → Managed Services 720 | ict management 10 cybersecurity 688 cloud 1527 | |
| secpoint.nl | SecPoint | The website presents various services, including vulnerability scanning, web application security audits, and SaaS software as a service, categorized as Protector, Penetrator, and Cloud Penetrator. A central element is the Cloud Penetrator vulnerability scanner, an automated system that can be deployed 24/7 to scan online systems and web applications and identify vulnerabilities. SecPoint emphasizes its proactive approach, mimicking cybercrime steps to prevent attacks, and provides clients with an efficient solution with 24/7 support and aftercare. | Information Technology → IT Security 980 | saas 131 vulnerability 149 web application 609 | |
| tunix.nl | TUNIX Digital Security | The organization offers a wide range of services, including authentication services, penetration testing, security awareness training, and managed services. TUNIX Digital Security has a team of experienced security experts that monitor clients’ systems 24/7 and has 25 years of experience in setting up perimeter security. The company provides a unique combination of design, implementation, and management of internet security solutions and is ISO27001 certified. | Information Technology → IT Security 980 | sla 22 network security 22 authentication 48 firewall 51 consultancy 2596 training 28133 | |
| digitaleoverheid.nl | Digital Government | The website publishes updates on policy, legislation, and current topics such as cybersecurity, artificial intelligence, and the NIS2 directive. There are also sections with fact sheets on various themes, such as the opportunities for women in IT and the challenges faced when working in technology and IT. In addition to information, the website offers e-learning courses and practical tools to improve the digital skills of professionals and stay up-to-date in the constantly changing digital world. | Government & Administration → Dutch Government 114 | e-learning 580 cybersecurity 688 digitalization 757 policy 2149 | |
| cyberwar.nl | Cyberwar.nl | The website hosts links to various publications including Strategic Studies Quarterly, Joint Force Quarterly, and Journal of Homeland Security Affairs. It maintains an archive of documents collected from the public internet and provides RSS feeds for several news sources and mailing lists related to cybersecurity and intelligence. The site also lists other websites and online communities focusing on cybersecurity topics, and includes information about events such as the Turing Centennial celebration at Bletchley Park. | International Cooperation Projects → International Relations 465 | intelligence 81 cybersecurity 688 publication 2018 archive 2067 | |
| computest.nl | Computest Security | The company is dedicated to assisting organizations in winning the fight against cyber threats, offering services such as penetration testing, managed detection and response, and compliance assessments. Computest Security also provides various research and performance services, including load tests, stress tests, DDoS tests, and front-end performance analyses. The company has a knowledge base with articles, white papers, and a cybersecurity dictionary, and offers job vacancies for security traineeships and direct application opportunities. | Information Technology → IT Security 980 | penetration testing 43 incident 335 cybersecurity 688 risk 2896 performance 7586 | |
| one-conference.nl | ONE Conference | The event aims to provide a platform for sharing knowledge, best practices, and research results related to cybersecurity. This year’s edition will be held on September 30th and October 1st, 2025, featuring a plenary programme alongside smaller breakout sessions. Registration is currently open, and professionals can request invitations through a specific form, with selections occurring in two rounds. | Collaboration & Networking → Networking 1225 Events → Conferences & Meetings 5381 | programme 155 cybersecurity 688 conference 763 speaker 1481 registration 4366 | |
| cybersecurityraad.nl | Cyber Security Council | The CSR is composed of representatives from public and private organizations and the scientific community and works at a strategic level. The Council offers guidelines and publications, including advice, to support executives and business owners in improving the cybersecurity of their organization. The CSR is active in publishing the latest news and policy responses, such as a response to the advisory on reducing the cybersecurity vulnerability gap. | Community → Government & Administration 10567 | council 426 cybersecurity 688 | |
| dutchncca.nl | Dutch National Cybersecurity Certification Authority | The NCCA acts as the official cybersecurity certification body for the Netherlands, offering certification for ICT products, services, and processes. The website details various certification schemes, including the EU Common Criteria (EUCC) and Cloud Services (EUCS), and outlines the Dutch approach to cybersecurity certification, emphasizing transparency and efficiency. The NCCA hosts stakeholder meetings and provides updates on EU cybersecurity certification initiatives, as well as information on licensing for certification bodies and evaluation facilities. | Municipalities → Policy 607 | scheme 199 stakeholder 431 cybersecurity 688 netherlands 1376 certification 3380 | |
| mobi-id.nl | Mobi-ID | Mobi-ID ensures users of industry applications no longer need to remember passwords, as they gain access to a single, personal Mobi-ID. The platform offers control over employee permissions, making access to applications transparent and manageable per location. Businesses can request a Mobi-ID Business account to invite employees to create a Mobi-ID, which remains valid for their entire career and can be easily linked or unlinked. | IT Services & Consulting → Computer Networks 262 | password 213 application 3377 employee 4429 | |
| ultimum.nl | Ultimum | The website provides information about Ultimum's services, including cybersecurity, outsourcing, business solutions, and implementation of Microsoft Dynamics 365 Business Central. Ultimum offers a 24/7 Security Operations Center (SOC) using Rapid7 technology to protect organizations’ assets and supports businesses in improving their performance and continuous improvement of their IT infrastructure. Since 1997, Ultimum has been providing services focused on the agility, resilience, and continuity of organizations, and they offer detachment of ICT professionals. | Business Software → ERP Systems 1007 | soc 10 it-infrastructure 19 business solution 34 detachment 266 cybersecurity 688 | |
| surelock.nl | Surelock | The company offers various solutions, including security awareness training, phishing simulations, security consultancy, pentests, and vulnerability scans. Surelock emphasizes the importance of human factors in security, with experts and a platform deployed to protect organizations. The website presents case studies of clients and provides access to an app for monitoring security activities, with the possibility of personal advice and support. | | cybersecurity 688 app 4595 security 6655 | |
| weerbaredigitaleoverheid.nl | Platform: SPITZ congres & event | The website describes the 2025 cyber exercise as a complex scenario that challenges teams to make decisions under pressure and restore processes after an incident. It emphasizes that practicing and sharing knowledge are essential for combating cyber threats and addressing vulnerabilities. The website offers information about the program components, webinars, and a masterclass, and invites visitors to register and participate. | Ministries → Ministry of The Interior 10 | crisis 358 cybersecurity 688 webinar 870 registration 4366 | |
| dla.nl | DLA ICT | The company offers a broad spectrum of services, including security services, software development, infrastructure management, smart services, cloud telephony, virtual workplaces, and workflow management. DLA ICT focuses on delivering tailored solutions that meet the specific needs of the client, with a focus on improving efficiency and reducing the risk of cyberattacks. The website showcases customer cases, company news, and information about the team, including a warm welcome from Cheryl, and emphasizes the company’s collaborative and specialized approach. | IT → Managed Services 720 | cloud telephony 15 software development 358 infrastructure 1460 security 6655 | Gelderland → Winterswijk 1221 |
| hashbang.nl | Author (likely) | The site details several projects, including an aggregated intrusion detection dashboard utilizing PFSense metrics and Snort alert logs displayed via Grafana, Telegraf, InfluxDB, and Loki, implemented on August 25, 2024. A continuous forecasting pipeline leveraging MLops, Kubernetes, Argo Workflows, InfluxDB, and Darts was established on May 18, 2024, for managing personal knowledge management systems using Obsidian and related tools. The website discusses replacing Readwise with a self-hosted open-source alternative, Wallabag, utilizing Obsidian and a Wallabag plugin, as advocated by Ernst Jan Pfauth, highlighting concerns about subscription costs in note-taking workflows. | Software → Productivity & Office 1203 | | |
| clearict.nl | Clear ICT | Clear ICT guides companies through the transition to Microsoft Azure, the creation of a modern workplace, and the adoption of Microsoft 365, with a particular focus on cybersecurity. The website describes services such as fixed and mobile telephony, internet connectivity, and process automation, contributing to an efficient working environment. Clear ICT emphasizes the possibility of hybrid working, accessibility, and direct support, aiming to strengthen the cybersecurity and overall IT security of organizations. | Software & Computing → Cloud Computing 1253 | microsoft azure 16 process automation 22 hybrid work 35 microsoft 365 430 telephony 494 cybersecurity 688 | |
| freshbits.nl | Freshbits BV | Freshbits delivers webshops, online magazines, e-learning environments, and e-readers specifically tailored to the needs of the publishing industry. The website offers functionalities such as a sales monitor for webshops, online learning modules, and responsive websites with a clear interface. Since 2007, Freshbits has been actively developing custom online solutions and specializes in the publishing sector, with a team of developers, designers, and project managers. | Online Courses → E-Learning 606 | e-learning 580 monitor 1063 magazine 2182 webshop 8648 | North-Holland → Amsterdam 41253 |
| hackinthebox.nl | Hack In The Box | The website offers a news section, HITBSecNews, featuring updates and information from the hacker community. Hack In The Box also hosts an annual security conference, HITBSecConf, which takes place in the Netherlands and Malaysia. Furthermore, the organization publishes a free quarterly magazine, HITB Magazine, containing research and analysis. | Periodical Publications → Magazines 1001 | hacker 17 conference 763 magazine 2182 security 6655 news 15293 | |
| grip-it.nl | Grip IT Consultancy | The company specializes in providing advice and support regarding privacy regulations and information security. They offer services such as Gap Analyses, Privacy Managers as a Service, DPO as a Service, Privacy & Awareness Training, Pentests, and E-Learning Office 365. Grip IT Consultancy guides organizations towards GDPR/AVG compliance and NIS2/ISO 27001 certification, focusing on the client's needs and changing threats. | Privacy → Data Protection 224 | privacy 1286 certification 3380 security 6655 training 28133 | |
| bsm.nl | BSM | BSM assists businesses and organizations, from construction companies to law firms, in improving their digital security through services such as workplace audits, penetration tests, phishing tests, and SIEM monitoring. The company has gained expertise in digital forensic investigations, particularly in cases of cybercrime, allowing them to advise clients on the latest developments in hacking techniques. BSM offers tailored cybersecurity solutions, including penetration tests, application security, and demonstrating certified security testing, focusing on small, specialized businesses. | Information Technology → IT Security 980 | pentest 17 audit 622 | North-Holland → Amsterdam 41253 |
| perfectday.nl | Perfect Day Cyber Security | Perfect Day Cyber Security, an initiative of Nationale-Nederlanden, provides personalized, practical, and understandable cybersecurity advice specifically for small and medium-sized businesses. The website outlines a three-step plan to make companies cybersecurity compliant: a 0-measurement, addressing improvements, and ongoing contact with a cybersecurity expert. The company offers various solutions including a cybersecurity audit, a damage calculator, a knowledge base, and an online scan, aiming to protect companies from cyberattacks and comply with GDPR. | Online Marketing → Advertising Marketing 47 | audit 622 cybersecurity 688 scan 790 report 4551 | |
| aumatics.nl | Aumatics | Aumatics offers a wide range of IT and cybersecurity services, including managed IT, managed firewall, managed backup, cloud cost optimization, threat detection, and vulnerability scanning. The company also provides IT consultancy and security awareness training, as well as specific solutions for Operational Technology (OT) security. Aumatics describes itself as a proactive partner working with partners such as Palo Alto, Tenable, WatchGuard, and Pentera, to provide customized cybersecurity solutions and enhance organizations' resilience against cyberattacks. | | cybersecurity 688 partner 4272 network 11123 | Almere → Almere City 934 |
| ourmeeting.nl | OurMeeting | The application boasts a user-friendly interface, making meetings more efficient and intuitive. OurMeeting emphasizes security, privacy, and compliance with AVG regulations, meeting standards like DNB and ISO 27001. The website offers various functionalities, including smart integrations with other business software and the possibility to calculate savings through the use of the app. | Information Technology → IT Security 980 Legal → Privacy 596 | decision-making 152 privacy 1286 integration 1451 meeting 2381 app 4595 security 6655 | |
| scanmail.nl | Bitbunker | Scanmail checks incoming emails with multiple virus scanners, which are updated every half hour to detect new viruses. If it is certain that the email does not contain harmful content, it is sent to the user's inbox; otherwise, the email is temporarily stored and presented for acceptance. Scanmail aims to make email safe and effective by blocking spam and viruses and identifying unwanted emails. | Services → Email 161 | virus scanner 12 inbox 17 spam 34 email 1012 security 6655 | |
| ot-secure.nl | OT-secure | The website provides automated OT-security assessments that help companies map out the risks within their IT/OT environments and receive targeted recommendations. The assessments are tailored for various industries, including manufacturing, and are fully whitelabelable. The platform offers an OT Security Score, helps ensure operational continuity, and complies with increasingly stringent compliance requirements without manual audits or expensive consultants. | Management → Operations Management 235 | recommendation 120 continuity 128 compliance 506 assessment 1205 risk 2896 | |
| ncim.nl | NCIM Group | NCIM Group operates in sectors such as Defense, Intelligence & Security, Digital Forensics, Public & Private, focusing on project management, consulting, software development, and system management. The company offers services including project management, consultancy, IT architecture, and software development, developing software based on technologies like .NET, JAVA, Oracle and C++. NCIM Group has over 200 skilled professionals and builds IT solutions for clients in diverse sectors, emphasizing flexible software development and technical expertise. | Information Technology → IT Security 980 | defense 121 it 1539 consulting 3639 software 8291 | |
| softrax.nl | Softrax | Softrax specializes in SaaS selection, introduction, and consulting services, aiming to provide businesses with optimal IT knowledge. ITpedia serves as a platform with over 650 keywords covering various IT topics, including SaaS selection, cybersecurity, and project management, offering a resource for initiating and understanding IT projects. Inspector Online is a tool developed by ITpedia for assessing the quality of IT projects, while Controls is a simulation game designed to enhance project management skills. | Online Services & Platforms → SaaS 171 | saas 131 cybersecurity 688 consultancy 2596 project management 3423 | South-Holland → Maassluis 988 |
| activato.nl | Activato B.V. | Activato B.V. is an ICT partner that provides Managed Services, cybersecurity, cloud solutions, and support. The services offered include cloud solutions, online desktops, Microsoft 365 support, helpdesk, hardware, security, VoIP & Mobile, web design & hosting, domain registration and hosting. Activato B.V. offers specific cybersecurity solutions such as EDR & Patch management, Firewall, Awareness (Phished Awareness), NDR-SIEM, and advises companies to consider cybersecurity as a strategic priority. | IT → Managed Services 720 | managed services 95 cloud solutions 281 microsoft 365 430 cybersecurity 688 networking 842 webdesign 4092 | Maashorst → Uden 1540 |
| herito.nl | Herito | The company offers a wide range of services, including business mobile internet, fixed internet (Copper & VDSL), cybersecurity solutions, business fiber optic, business networks, and managed IT services. Herito also provides web development, cloud solutions (managed cloud, Office 365, private cloud, video cloud), printer services, business Wi-Fi and telephony, as well as smart building systems such as intercom systems and alarm systems. Furthermore, Herito offers free advice and regularly publishes blog posts and news about current developments in the telecom and IT sector, as well as customer reviews. | | cloud 1527 internet 1678 security 6655 network 11123 | |
| almeerpc.nl | Almeer IT | Almeer IT provides various ICT services, including workplace management, server management, network management, and online/cloud services, primarily serving companies in the real estate and legal sectors. The company has managed over 150 companies of varying sizes and also offers IT security services, including automation solutions and 24/7 monitoring via a Security Operations Center. Under the name Almeer Secure, the company offers specific IT security services, including a basic package for workstations, and emphasizes the importance of protecting businesses against cyber threats through advanced security technologies. | Technology → ICT 486 | cyber threats 15 server 1036 ict 1049 security 6655 network 11123 | Flevoland → Almere 7765 |
| mrwebhosting.nl | Mr. Webhosting | The website offers various hosting modules, such as 'Website Host', 'Webshop Boost' and 'SSL'. Customers can benefit from fast hosting, regular backups, and unlimited data traffic on super-fast SSD storage. Mr. Webhosting provides support through a single point of contact and a personal account for customers. | | data traffic 35 backups 83 ssl 132 webhosting 948 module 971 account 5781 | |
| skynetworks.nl | Sky Networks | The company describes itself as a young and innovative cybersecurity specialist with years of experience. They offer various services including professional services, support, management & monitoring and partners. Sky Networks has achieved Elite Partner status with Check Point, highlighting their expertise and commitment to the sector. | | threat 62 cybersecurity 688 transformation 1081 ai 2181 partner 4272 | |
| h-it.nl | H-IT Kenniscentrum | The company focuses on helping entrepreneurs to set up and run their businesses by fully taking care of IT-related matters and developing platforms, VoIP environments, and websites. H-IT's consultants work on large projects for major clients such as ABN AMRO, Rabobank, IBM and ING, allowing them to have experience in solving IT issues for both small and large organizations. H-IT offers a range of solutions, including web hosting from a few euros per month, domain registration, virtual servers, Office 365 packages and data protection with backups to external locations. | IT Services & Consulting → Computer Networks 262 | voip 425 server 1036 domain 1811 consultancy 2596 hosting 3125 | |
| techtitan.nl | techtitan.nl | The website explains the need to identify vulnerabilities in IT environments to prevent cyberattacks. The company offers services including conducting scans, analyzing findings, and establishing a cybersecurity awareness program. The website specifically targets SMEs and provides solutions to the growing threat of cyberattacks, allowing businesses to operate more securely. | Information Technology → IT Security 980 | cyberattacks 17 it environment 35 vulnerability 149 scan 790 report 4551 security 6655 | |
| hatstack.nl | Hatstack | The group originated in 2015 as a response to a desire for deeper knowledge among students at FHICT, initially formed by several students including bef0re, Nemoriety, Luc, Burningnetel, and Xesxen. Hatstack's core values include knowledge sharing between educators and students, the promotion of ethical hacking and security practices, and a commitment to treating all members equally, with occasional lighthearted IT-related humor. The group established its first public presence in 2015 with the creation of an IRC channel, documenting its birth date as September 18, 2015, and subsequently offering resources for learning about IT security and community interaction. | Higher Learning → Higher Education 3584 | irc 16 it security 37 knowledge 3528 community 7931 | |
| annevankesteren.nl | Anne van Kesteren | The URL parser exhibits unusual behavior, primarily when dealing with base URLs. It can return different URLs based on the presence and type of the base URL, particularly with 'special schemes' like http and https. This quirk isn't considered critical because the results are ultimately normalized. However, it can cause inconsistency when parsing non-conforming inputs, requiring users to implement a workaround. The author notes a long-standing effort to remove this quirk but ultimately acknowledges that practical considerations and reliance by websites and users prevented its removal. | Computer Science → Software Engineering 404 | url 52 scheme 199 | |
| infosecuritymagazine.nl | InfosecurityMagazine.nl | An article discusses the introduction of the EZVIZ HP7 Pro 4K 4K video doorbell with palm recognition. Another article describes the partnership between Compumatica and NTT DATA to enhance digital resilience in vital sectors, with Compumatica becoming a Gold Partner of NTT DATA. The website informs about the collaboration between Jaarbeurs/Cybersec Netherlands and LuteijnMedia, who are organizing an event on September 10 and 11 regarding cybersecurity. | | economy 682 partnership 1407 trend 1865 article 6000 security 6655 research 8967 | Netherlands → South-Holland 92382 |
| marc-stevens.nl | Centrum Wiskunde & Informatica | Dr. Stevens' work includes co-authoring the revised PQC Migration Handbook with AIVD, CWI, and TNO, which details the migration to post-quantum cryptography, and was presented to the State Secretary for Kingdom Relations and Digitalization. Recent research has focused on exploiting the Blast-RADIUS vulnerability, developing a significantly faster collision attack on MD5 that enabled a demonstrated Man-in-the-Middle attack against RADIUS servers. The website highlights involvement in events like the Parlement & Wetenschap Minisymposium, discussing the implications of quantum technology on information security and outlining preparedness measures. | Computer Science → Cryptography 27 | cryptography 31 attack 31 vulnerability 149 handbook 194 symposium 339 | South-Holland → The Hague 19898 |
| bluem.nl | Bluem | The website specializes in various services such as iDEAL payment services, authorization mandates, iDIN identification, digital signatures, and IBAN name checks, with the goal of making online transactions safer and more efficient. Bluem optimizes the entire process from onboarding to payment, enabling businesses to achieve speed, convenience, and efficiency, and ensuring security in online transactions. The platform also offers solutions such as real-time ID scans, AML controls, address lookup, and payment screens in the brand style, focused on providing businesses with the tools for a customer-friendly payment experience. | Banking & Payments → Payment Services 72 | authorization 32 identification 76 payment 1389 | |
| bmc.nl | BMC | The website covers a wide range of topics, including finance, governance, safety, digitalization, and the development of a smart society. The company offers expertise in data-driven policy, information security, and the implementation of the AVG and Wpg legislation, as well as artificial intelligence. Furthermore, the website provides an overview of various aspects of public services, from the social domain and youth care to education and housing. | Municipalities → Governance 1043 | information security 217 policy 2149 data 5872 training 28133 | |
| warpnet.nl | Warpnet | Warpnet offers various services including penetration testing (including different types), code reviews, and Site Reliability Engineering (SRE). The company has over 25 years of experience in IT Security and provides solutions for exposing vulnerabilities and improving the cybersecurity of environments. Warpnet collaborates with other companies, such as Patchmanager B.V. and Bloxs, which provide positive feedback on their expertise and service. | Information Technology → IT Security 980 | penetration testing 43 cybersecurity 688 infrastructure 1460 application 3377 | |
| paradoxis.nl | Paradoxis | Luke Paris is an OSCP and OSWE certified cybersecurity expert specializing in penetration testing and software development. His professional experience includes roles at Fox-IT, DearBytes (KPN Security), Searchresult, and VCreations, focusing on internal network penetration testing and web application security. He maintains a blog and GitHub repository showcasing his security research, tools for developers, and CTF challenge participation. | Computer Science → Networking 809 | penetration testing 43 github 108 software development 358 cybersecurity 688 research 8967 blog 13392 | |
| amitron.nl | Amitron | Amitron advises organizations on advanced IT security solutions and provides helpdesk support, managed services, and implementation services. Amitron’s approach includes consulting, implementation, and ongoing support, focusing on IT and OT environments. Amitron offers multi-cloud security solutions and keeps clients informed about the latest cybersecurity developments, including the NIS2 legislation. | Consulting → Security Consulting 31 | consulting 3639 security 6655 | |
| bjornweb.nl | VUSec | Björn Ruytenberg is a security researcher focusing on hardware, firmware, and operating system security, with a particular interest in x86-64 platform security, including BIOS, hypervisors, and PCI Express. His research includes identifying critical vulnerabilities in Intel Thunderbolt technology, exemplified by the project Thunderspy. He has presented his findings at numerous conferences and events. Currently, he is a PhD candidate at VUSec, Vrije Universiteit Amsterdam, and holds degrees in Computer Science and Electrical Engineering, demonstrating a strong academic background in cybersecurity. | Research → Scientific Research 243 | phd 104 thesis 228 conference 763 security 6655 research 8967 | Gelderland → Nijmegen 9384 |
| isaca.nl | ISACA Netherlands Chapter | The chapter organizes events such as round tables, webinars, and conferences in collaboration with various organizations. Training offerings include certifications, courses like ISO27001 and CISA, and specialized topics like GenAI for Audit & Risk and NIS2. The website also features news, articles, and a newsletter to keep members and interested individuals informed about digital trust and security developments. | Organizations → Professional Associations 1004 | resources 310 netherlands 1376 certification 3380 security 6655 training 28133 event 45199 | |
| kapaza.nl | Kapaza.nl | The website blog covers topics such as urban greening, wearable technology, 5G technology, blockchain technology, and the future of AI. The articles emphasize the potential improvements and innovations that these technologies can offer in various sectors, such as healthcare, transportation, and education. The blog encourages readers to learn and be inspired by offering them new perspectives and valuable knowledge. | Information Technology → IT Security 980 | 5g 46 blockchain 250 ai 2181 technology 6816 | |
| pipernet.nl | pipernet.nl | The Velomoblog website has unfortunately been hacked and will not be restored, meaning visitors can no longer access its content. Speculation exists that a new page or website might arise in the future on the site of Velomoblog, but there is no concrete information regarding its content or timing. It is currently unknown when and what the new website will contain. | Information Technology → IT Security 980 | hack 36 | |
| cyberrating.nl | CYRA | CYRA helps entrepreneurs develop digital resilience through a self-assessment and a certification model consisting of four programs. The website offers various levels of digital resilience (basic, intermediate, advanced) and focuses on enhancing the resilience of the entrepreneur, colleagues, and customers. CYRA collaborates with various industries and sectors to create specific tools that align with the needs of the entrepreneur, making digital resilience more accessible. | Digital Media & Design → Digital Transformation 954 | digital resilience 13 self-assessment 15 industry 1780 certification 3380 model 3546 | |
| cybersecuritycouncil.nl | Cyber Security Council (CSR) | The CSR is comprised of representatives from various sectors, including public, private, and scientific organizations. The council conducts strategic initiatives to improve cybersecurity practices within the country. The website provides access to documents, advisory letters, publications, and information about the council's structure and activities. | International Cooperation Projects → International Relations 465 | council 426 cybersecurity 688 netherlands 1376 document 1678 strategy 9379 member 10154 | |
| veiligbankieren.nl | Veilig Bankieren | The platform features an overview of various types of fraud, such as phishing, bank-at-home fraud, WhatsApp fraud, and malware. The website offers explanations of what these forms of fraud entail and how to recognize and prevent them. Additionally, Veiligbankieren.nl provides educational materials, such as lessons and courses, to help users safely bank and shop online. | Personal Wealth → Personal Finance 2348 | phishing 34 fraud 200 bank 374 internet 1678 security 6655 | |
| dutchlegaltech.nl | Dutch Legal Tech | The organization achieves this by connecting individuals, ideas, and organizations to promote learning and growth within the legal tech sector. Dutch Legal Tech organizes events, including Legal Tech Meetups featuring international legal innovators, and hosts the Legal Tech Startup Awards to showcase promising startups. Established in 2014 by Jeroen Zweers and Jelle van Veenen, the organization serves as an open community welcoming anyone with an interest in legal innovation. | Information Technology → Data Management 827 | startup 376 innovation 4659 community 7931 event 45199 | |
| promax.nl | Promax IT | Promax IT provides a range of IT services, including cloud workspaces, device management, cloud telephony, backup and disaster recovery solutions, and infrastructure management. Within cybersecurity, Promax IT offers services such as prevention, security awareness training, vulnerability scanning, cybersecurity assessments, and multi-factor authentication. The website describes successful collaborations with various companies, such as The Rootstock Company and Anders Invest, highlighting the excellent IT support provided by Promax and the modernization of their IT infrastructure. | Information Technology → IT Security 980 | artificial intelligence 291 cybersecurity 688 infrastructure 1460 cloud 1527 | |
| schippers-it.nl | Schippers IT | Schippers IT supports companies in combating digital crime by selling and using advanced software and hardware solutions. The website offers a wide range of services, including incident response, vulnerability assessments, penetration testing, digital forensics, e-discovery, mobile forensics, evidence seizure, and expert testimony. Schippers IT also offers training, IT management, and a webshop, and has vacancies for various positions, including internships and employees. | Information Technology → IT Security 980 | incident response 15 it-management 23 cybersecurity 688 training 28133 | |
| scentiss.nl | Scentiss | Scentiss is a research consortium dedicated to supporting social and community-driven entrepreneurs (SCEs) by developing scaling strategies and robust ecosystems. The consortium recognizes challenges in scaling SCE practices and innovations, aiming to address these issues through research and practical initiatives, particularly related to societal transitions such as the energy transition and local care system changes. Recent activities include finalizing a research framework position paper, presenting at the EMES International Research Conference, and launching a national network for welfare, housing, and care called Nederland Zorgt voor Elkaar. | Anthropology & Sociology → Sociology 454 | social entrepreneurship 23 ecosystem 262 conference 763 innovation 4659 research 8967 network 11123 | South-Holland → Rotterdam 25048 |
| openkat.nl | Ministry of Health, Welfare and Sport | OpenKAT is a tool that scans networks and systems, analyzes the retrieved information, and generates reports. The tool integrates various network and security tools and retrieves information from external databases. Recent versions (v1.18, v1.17, v1.16) add functionality such as reporting scheduling, saving reports, and adding custom 'boefjes' (scripts). | Information Technology → Network Security 85 | vulnerability 149 release 359 report 4551 network 11123 | |
| pragmaticka.nl | Pragmaticka | Pragmaticka supports organizations in creating a secure and efficient digital workplace. The company makes enterprise knowledge accessible to SMEs, based on experience with complex IT challenges from larger organizations. Pragmaticka offers smart, scalable solutions, with attention to ease of use, cybersecurity, risk management, and regulatory compliance. | IT → Managed Services 720 | digital workplace 30 cybersecurity 688 risk 2896 innovation 4659 | |
| hetnieuwewerkenblog.nl | Niet vermeld | The website addresses the importance of kraft paper bags in retail due to their sustainability, authenticity, and versatility. Articles cover improving e-commerce strategies such as linkbuilding and online marketing, and also discuss the challenges of being an entrepreneur, such as administration and customer service. The site also covers practical matters for entrepreneurs, such as finding a business address to save on office costs and the importance of cybersecurity when using charging infrastructure. | Information Technology → IT Security 980 | linkbuilding 473 cybersecurity 688 e-commerce 738 | |
| cybersaveyourself.nl | SURF | The website provides content adapted to various roles within the education and research sector, such as researchers, teachers, and students. CSY addresses important topics such as phishing, ransomware, and data privacy, offering tools, training, and campaign materials for security professionals. The site is an initiative of SURF and provides information and guidelines to protect users from cyber threats and to work safely online. | Information Technology → IT Security 980 | threat 62 privacy 1286 security 6655 research 8967 education 13471 | |
| wiccon.nl | WICCA | The conference will take place on October 31 & November 1, 2024, in Haarlem, The Netherlands. WICCON features an all-women speaker line-up dedicated to highlighting women's accomplishments in cybersecurity. WICCON is organized by WICCA, a community of over 1000 women in cybersecurity who collaborate with various organizations to promote learning and development in the field. | Events → Conferences & Meetings 5381 | cybersecurity 688 conference 763 netherlands 1376 speaker 1481 community 7931 | North-Holland → Haarlem 8674 |
| cwbrainport.nl | Stichting Cyber Weerbaarheidscentrum Brainport | The centre is a non-profit organization that helps companies build cybersecurity resilience, offering knowledge, services, and threat intelligence from the government. Members receive access to a private community, current threat information, and advice on preventing cyberattacks. The centre also offers immediate assistance with cyber threats and organizes school challenges to raise awareness. | Business → Industry 36977 | cyberattacks 17 threat 62 cybersecurity 688 community 7931 membership 10442 | North-Brabant → Eindhoven 11845 |
| ikwilmobielwerken.nl | IkWilMobielWerken | The CTO Benelux of HP, Rajendra Sitompoel, emphasizes that hardware plays a crucial role in the broader innovation strategy, despite often being underestimated by CTOs. The website publishes articles and whitepapers on topics such as data science, AI for IT professionals, the transformation of IT management, and productivity/safety in the workplace. ‘IkWilMobielWerken’ collaborates with a range of partners, including HP, H&R, Avictus, Aces Direct, Bechtle, Dustin, ARP, PCI, and NEG-IT Solutions, who share their experiences and cases. | Startup & Innovation → Innovation 1041 | whitepaper 116 data science 193 artificial intelligence 291 cybersecurity 688 hardware 941 partner 4272 | |
| knns.nl | KNNS B.V. | KNNS provides a range of services including Microsoft Azure implementation, IT management, cybersecurity, automation, and advice related to the NIS2 guidelines. The website outlines a four-step process to improve a company's digital resilience: risk analysis, implementation of a secure ecosystem, awareness and training, and ensuring business continuity. KNNS offers various services such as Microsoft 365 setup and training, cloud backup, data storage, IT management and monitoring, and security solutions utilizing artificial intelligence. | Business Software → Cloud Solutions 82 | it-management 23 azure 222 microsoft 365 430 cybersecurity 688 cloud 1527 | |
| omniscale.nl | Omniscale | Omniscale has been developing websites, tools, and applications for the web since 2008, offering technological and budgetary solutions. The company provides a centralized tool for analyzing and reporting on business functions, as well as a franchise platform for garage owners. Omniscale strives to understand user needs and design engaging tools that are effectively utilized, strengthening the connection between professional and tool. | Web Design → UX Design 613 | franchise 284 challenge 1697 application 3377 tool 3907 | |
| hackhelpdesk.nl | HackHelpdesk | The website focuses on entrepreneurs who may have been victims of cybercrime and offers practical help in minimizing damage. HackHelpdesk collaborates with the Cyberwijzer, allowing users to chat directly for advice and guidance. The website emphasizes the importance of awareness and preparation for cyber risks, as many entrepreneurs are not fully aware of the impact of cyber incidents. | Insurance & Risk → Risk Management 1060 | cybercrime 87 help 864 risk 2896 | |
| nfir.nl | NFIR | The website describes various services, including preventative measures such as penetration testing and security monitoring, reactive measures such as incident response and digital forensic investigation, and security consultancy. NFIR also offers services in the area of security awareness training and the drafting of incident response contracts. The website emphasizes NFIR’s role as a 24/7 available cybersecurity specialist, certified by NFIR and recognized by Bel NFIR. | Information Technology → IT Security 980 | incident response 15 penetration testing 43 cybersecurity 688 | South-Holland → Rijswijk 2054 |
| virus.nl | Virus.NL | The website covers various forms of malware, such as rootkits, fileless malware, and cryptojacking, and describes how users can protect themselves from these threats. Virus.NL also addresses related cybersecurity problems, including HTTPS and IP spoofing, DNS spoofing, email hijacking, and Wi-Fi eavesdropping, and explains how to recognize and prevent these vulnerabilities. Visitors can sign up for newsletters to stay informed about the latest cybersecurity developments and updates. | Technology & Digital → Technology News 31 | malware 41 threat 62 virus 195 cybersecurity 688 | |
| hcagroep.nl | HCA Groep | HCA Groep provides a wide range of services including ICT management, managed services, workplace management, data destruction, cloud solutions (on-premise and cloud), and cybersecurity services such as network scans, IT policies, and ISO 27001 certification. The company proactively monitors customer network environments 24/7 to identify and resolve issues, and also offers services for data security, AVG/GDPR compliance, and disaster recovery. Furthermore, HCA Groep offers repair services for electronic equipment and provides advice on various ICT challenges, including security, infrastructure, and procedures. | | cybersecurity 688 ict 1049 cloud 1527 data 5872 network 11123 | |
| versterkencyberweerbaarheid.nl | Ministry of Infrastructure and Water Management | The ministry is working towards a livable, safe, and accessible Netherlands, with digitalization playing a crucial role. The 'Strengthening Cyber Resilience' program offers guidelines, courses, and training to make organizations more digitally resilient against cyber threats. The website provides information on various themes, including collaboration, ransomware preparedness days, and different training programs (Red Team, Blue Team, OT Cybersecurity). | Civil & Infrastructure → Infrastructure 1033 Nature Conservation → Water Management 1138 | cyber threats 15 course 14728 collaboration 16036 | |
| nivo.nl | Nivo | Nivo provides consulting services in the areas of networking, cybersecurity, and cloud integration, offering advice on setting up modern networks for complex campus environments. The website informs about the possibilities of working with Nivo, including permanent employment, franchise entrepreneurship, and self-employed entrepreneurship. Nivo regularly publishes news articles, case studies, and agenda items on topics such as cloud engineer salaries, cybersecurity challenges, and franchise meetings. | IT Services & Consulting → SMBs 230 | franchise 284 cloud 1527 consulting 3639 agenda 4374 security 6655 network 11123 | |
| matenict.nl | MatenICT | The website showcases various services such as system management, cloud services, cybersecurity, and telephony, focused on improving businesses’ IT infrastructure. MatenICT offers both basic contracts and fully managed solutions for IT management, including installation and proactive management of systems. The website also lists job vacancies for IT professionals, including customer service and all-round IT engineers, and provides contact details for clients. | IT → System Management 272 | cloud services 198 system management 431 telephony 494 cybersecurity 688 cloud 1527 | |
| plusautomatisering.nl | Plus Automatisering | The company specializes in network management, workplace support, security, and internet services, offering various solutions such as cloud solutions, printers, websites, and webshops. Plus Automatisering protects business data by securing computers and networks, providing customized solutions with certified and experienced staff. The organization offers support services via phone and email and promotes a newsletter to keep visitors informed of the latest developments. | IT → Network Management 702 | cloud solutions 281 printer 634 security 6655 network 11123 | Het Hogeland → Zuidwolde 359 |
| bluebuildinginstitute.nl | Blue Building Institute | The institute supports all parties involved in the real estate chain with advice, tools, certifications, training, and networking events, as most of our time is spent in and around buildings. The website offers an ESG Academy Series with webinars on topics such as CSRD readiness and the transition from 'grey' to 'green' real estate and investments. Furthermore, the institute provides consultancy services, including ESG advice, certifications (BREEAM, WELL) and ESG reporting, and a library with relevant articles, podcasts, and research. | Property Development & Redevelopment → Sustainable Real Estate 48 | esg 83 webinar 870 consultancy 2596 certification 3380 real estate 4981 sustainability 18451 | |
| tudelf.nl | TU Delf | The website offers an overview of various IT solutions, including IT solution services, designs, app maintenance, big data analysis, and cybersecurity. TU Delf has a team of experienced engineers and offers 24/7 support. The blog contains articles about gadgets, reliable power supply, and the purchase of second-hand technology. | Data Analysis → Business Intelligence 1002 | big data 34 it solutions 181 engineer 198 gadget 477 cybersecurity 688 | |
| mydigitals.nl | MyDigitals | The website provides information about cybersecurity coaching to enhance the Security Risk Management process. Training and consultancy services are offered to increase knowledge about digital security. MyDigitals offers managed services to gain control over IT systems and digital information, and security testing to identify vulnerabilities. | Information Technology → IT Security 980 | managed services 95 vulnerability 149 security 6655 coach 25810 training 28133 | |
| bluegreensolutions.nl | Blue Green Solutions | The company specializes in leveraging Mendix's low-code platform to automate workflows, modernize software, and foster innovation for its clients. Blue Green Solutions offers a range of services including full-service IT solution development, Mendix Partner Enablement training, and collaborative application development with existing in-house teams. The website provides resources such as blogs, whitepapers, webinars, and job vacancies, alongside information about industries served and specific solutions offered. | Training → IT Training 220 Digital Media & Design → Digital Transformation 954 | mendix 34 digitization 216 automation 2682 application 3377 | |
| jurcom.nl | JURCOM | The company, JURCOM, acts as an interface between organizations and complex regulations globally, focusing on governance, risk, and compliance. JURCOM offers a wide range of services and solutions covering data protection regulations such as GDPR, PIPL, LGPD, CCPA, and others across various countries and regions, alongside climate-related compliance initiatives. The website details opportunities for partnership, outlines career prospects, and introduces the company’s management team, emphasizing their expertise and commitment to achieving GRC excellence. | Municipalities → Governance 1043 Financial Services → Compliance 399 | data protection 30 compliance 506 regulation 1350 partnership 1407 | |
| sonad.nl | Sonad | Recognizing that security has become a standard in the hosting world, Sonad has focused on providing security solutions such as email filtering and website design to stay ahead of hackers. The company has operated with a team of 1.5 people and found it challenging to maintain competitive rates. The last server will be shut down by October 1st, and Sonad thanks its customers for their trust. | Services → Email 161 | email 1012 server 1036 hosting 3125 security 6655 | |
| e11even.nl | E11EVEN B.V. | APO11O™ is an ICT platform developed by E11EVEN B.V. that integrates and makes data from diverse sources fully searchable. Forensic accounting investigations provide insight into facts and circumstances, utilizing multiple sources of information. The website addresses questions about an organization’s vulnerability to hacking, the duration of data breaches, and how to detect cyberattacks. | Information Technology → IT Security 980 | hack 36 data 5872 | |
| flashpro.nl | Flashpro | The company describes itself as an IT service bureau focused on advanced software, research, and business solutions for clients. The website features a blog with recent articles on various technology and marketing topics, including electronic systems and web design. Flashpro offers diverse IT services, including UI/UX design, software development, website development, support management, market research, and cybersecurity, promoting a money-back guarantee. | Data Analysis → Business Intelligence 1002 | ui/ux design 51 market research 163 data analysis 211 cybersecurity 688 software 8291 blog 13392 | |
| digital-me.nl | Digital Me BV | The consultancy’s services aim to increase mutual trust, reduce costs, enhance data quality, and safeguard privacy for both individuals and organizations. The core technology behind Digital Me’s offerings is the Qiy Scheme, which prioritizes individual control over personal data as championed by the Qiy Foundation. Digital Me operates from Eindhovenseweg 22a, 5281 RA, Boxtel, The Netherlands, and is a subsidiary of Digital Me BV. | Online & Digital → Digital Services 1008 | scheme 199 trust 1147 infrastructure 1460 consultancy 2596 tool 3907 data 5872 | North-Brabant → Boxtel 1154 |
| qnp.nl | QNP ICT & Telecom professionals | The website provides information on a wide range of ICT solutions including cloud solutions, infrastructure management, workplace management, cybersecurity, and telephony. QNP offers consultancy services, both in the context of ICT and cybersecurity. Training and simulations are also offered to inform and raise employee awareness about information security. The website emphasizes delivering solutions that meet the needs of the client, with a ‘stress-free’ approach for both IT and security. | IT → Network Management 702 | ict solutions 15 workplace management 88 telephony 494 cybersecurity 688 infrastructure 1460 consultancy 2596 | |
| secwatch.nl | Secwatch | The company offers penetration tests performed by ethical hackers, providing a comprehensive risk assessment of the client's cybersecurity posture. Secwatch proactively collaborates with clients to systematically improve their security systems and is immediately available to clients for questions and support. The company values transparency and customer focus, working specifically from the business, industry, and interests of the client to enhance cybersecurity. | Information Technology → IT Security 980 | pentest 17 hack 36 cybersecurity 688 risk 2896 report 4551 | |
| port-it.nl | Port-IT | The website offers a range of cybersecurity solutions including antivirus, UTM, NDR, External Attack Surface Management, and VANIR products. Port-IT also provides connectivity solutions like LEO connectivity, Crew Wi-Fi, and Orilla, alongside onboard IT services such as a virtual engineer and 24/7 support. The company highlights their partnership with ESET Platinum, their IMO 2021 compliance, ISO 27001 certification, and a global presence with offices in Europe and APAC. They focus on proactive protection and reliable, cost-effective solutions. | Radio & Communication → Telecommunications 1361 | antivirus 74 connectivity 173 vessel 262 cybersecurity 688 | |
| doc-access.nl | DOC-access | DOC-access is an online authentication system specifically designed for medical professionals. Users can create a free account and apply for a web passport. The application is processed immediately upon registration, and login credentials are sent via email. | IT Services & Consulting → Computer Networks 262 | username 63 login 160 password 213 account 5781 | |
| quividet.nl | QuiVidet | The company offers services such as ethical hacking, penetration testing, vulnerability scans, and social engineering to identify vulnerabilities and provide recommendations. QuiVidet offers a complete package for Application Security Programs, both on a project basis and as a Managed Security Service Provider (MSSP). In addition, the company offers monitoring, web scanning (including the Deep and Dark Web), and consultancy services to improve the security of networks, websites, and personnel. | Information Technology → IT Security 980 | vulnerability 149 cybersecurity 688 monitor 1063 | |
| wakercybersecurity.nl | Waker Cyber Security | The company focuses on building and monitoring digital dikes, referring to providing protection against cyber threats and ensuring privacy. Waker Cyber Security partners with Snakeware to establish a new standard in digital security, with a focus on customization and flexibility. The name ‘Waker’ is inspired by a water-resistant dike, emphasizing multiple layers of protection and a proactive approach to threats. | Legal → Privacy 596 | osint 12 dpia 17 dike 148 gdpr 179 privacy 1286 | Tynaarlo → Zuidlaren 445 |
| markkazemier.nl | Mark Kazemier | The website focuses on cybersecurity topics, including reports and insights from conferences like RSA. Recent posts detail the conclusion of RSA Conference 2025, highlighting sessions and events that took place. A significant portion of the content centers around budget optimization strategies for cybersecurity, drawing on research from IANS and Artico Research, particularly focusing on the 2024 Budget Benchmark Report. The blog post ‘The Frugal CISO’ analyzes how organizations can effectively implement cybersecurity measures with limited resources, emphasizing personnel and training as key investment areas. | Social → Personal Blog 2718 | personnel 1084 budget 1335 session 1791 automation 2682 security 6655 | |
| lexdigitalis.nl | Lex Digitalis | The website highlights the challenges surrounding privacy and data protection arising from rapid digital developments and aims to provide clarity on what is permitted and what is not. Lex Digitalis offers advice and support in carrying out various assessments (IAMA's, DPIA's, DTIA's), awareness campaigns, legal advice, and establishing privacy organizations, including filling vacant positions. The website provides job postings, including positions at the Erasmus Medical Center and as a Privacy Consultant, and shares links to relevant news articles, such as those concerning the Environmental Act and the activities of Stork. | Privacy → Data Protection 224 | cybersecurity 688 assessment 1205 privacy 1286 data 5872 vacancy 6598 | |
| sudo.nl | Sudo Cybersecurity B.V. | Sudo Cybersecurity delivers strong security specialists for temporary assignments, projects, and long-term reinforcement, focusing on quick response, careful selection, and compliance. The company works with experts with security knowledge and has experience with governments and critical infrastructure. They supply specialists for various sectors, including government, energy, transport and telecom. Sudo Cybersecurity offers certified technical specialists in various cybersecurity disciplines, such as firewall engineers and incident responders, who make a direct impact on the organization's clients. | HR Services → IT Recruitment 447 | detachering 18 cybersecurity 688 specialist 938 cloud 1527 security 6655 network 11123 | |
| valueit.nl | ValueIT | ValueIT ensures businesses have a clear understanding of their IT budget and how it's spent. The website offers various services, including cloud services, consultancy, cybersecurity, training, and the management of hardware and software. ValueIT develops a cybersecurity quickscan to assess and improve the IT security of organizations, considering the current trend of remote work. | Software & Computing → Cloud Computing 1253 | cloud services 198 cybersecurity 688 it 1539 consultancy 2596 network 11123 training 28133 | |
| dsrcommerce.nl | DSR Commerce | The website provides services in web development, hosting, and AI services, including AI Chatbot Development and Quantum Crypto Trading Bots. DSR Commerce emphasizes its expertise in combining AI technology, marketing tools, and hosting to support the digital growth of clients. The website presents various AI solutions, including the Quantum Crypto Trading Bot (AI QCTB) and an AI Chatbot, with a focus on automation and risk management. | Computer → Computer Support 1003 | chatbot 137 crypto 384 web development 965 ai 2181 hosting 3125 marketing 7107 | South-Holland → Rotterdam 25048 |
| complite.nl | Complite | Complite is a partner specializing in legal and regulatory compliance for the processing of personal data. The website offers various software products such as GDPR Software, Audit Management Software and ISO 27001 compliance software, as well as consultancy services for GDPR, NIS2 and ISO 27001. Complite aims to make organizations compliant with relevant regulations efficiently and easily, offering expert guidance and a dashboard for overview. | Privacy → Data Protection 224 | iso27001 22 gdpr 179 compliance 506 dashboard 1374 consultancy 2596 software 8291 | |
| breinwave.nl | Inspiration for Tomorrow | The website covers topics such as hybrid working in 2025 and the changing work patterns after the pandemic. Articles address subjects like competitive analysis, the right to be forgotten, and the impact of crypto-apps on investing. The website also presents biographical information about famous Dutch figures, such as Walid Benmbarek, Karel Gerlach and Jos Leijdekkers, with various facts about their lives. | | hybrid work 35 privacy 1286 entrepreneurship 1579 knowledge 3528 finance 5341 | |
| contec.nl | Contec | Contec is a Dutch distributor and supplier of globally deployable IT security solutions, aiming to help clients maximize the benefits of IT security. The website offers various security solutions, including FileCap, a cloud-based endpoint antivirus solution, and provides tailored advice based on years of expertise. FileCap is available via web, as a plugin within Outlook/Office 365, and on mobile, with a focus on security, ease of use, and customization to the user's brand style. | Information Technology → IT Security 980 | partner 4272 security 6655 | |
| blackip.nl | BlackIP | The website offers a range of services including protection, recovery, archiving, DNS security, anti-spam, phishing protection, vulnerability management, XDR, and DDoS protection. BlackIP promotes a 3-layer security approach for Office 365, with a focus on protection, recovery, and awareness. The company also offers support, a price list, free consultations, and a free quote, and has 20 years of experience in security expertise. | Real Estate → Enterprises 162 | office 365 135 approach 971 partner 4272 security 6655 quote 12863 | |
| arda.nl | Arda | The program offers online modules, games, interactive films, and phishing campaigns to train employees in an engaging way. The program is tailored to all employees in the organization and can be expanded with specific learning paths for IT staff, managers, and financial specialists. Arda complies with regulations such as the AVG, NIS2, ISO 27001, and NEN 7510. | Information Technology → IT Security 980 | information security 217 cybersecurity 688 employee 4429 data 5872 training 28133 | |
| purasec.nl | PuraSec | The website states that it's complex for organizations to determine the appropriate measures against risks such as ransomware, phishing, and data theft. A risk assessment is considered essential to map out the risks and tailor security improvements. PuraSec offers a variety of services, including risk assessments, penetration testing, and security officer as a service, to help companies strengthen their cybersecurity. | Information Technology → IT Security 980 | pentest 17 policy 2149 risk 2896 security 6655 | |
| radix.nl | Radix | The company offers structured IT management and dedicated cybersecurity solutions for SMEs, emphasizing reliable IT systems, security, and affordability. Radix provides a range of services including 24/7 workplace monitoring, malware protection, backups, disaster recovery, security awareness training, and phishing testing, all tailored to SME needs. The services encompass tasks from fire safety and system setup to user management, network management, and Microsoft 365 implementation. | | cybersecurity 688 infrastructure 1460 it 1539 network 11123 | |
| kappadata.nl | Kappa Data | Founded in 1998, the company has over 20 years of experience as a Value-Added Distributor (VAD) serving the SME and enterprise markets. Kappa Data offers a wide range of products, services, and solutions, including network infrastructure, WiFi, security, and IoT connectivity. The website provides information on training and events, technical services, support, and contact options, along with company information and values. | IT → Network Solutions 45 | iot 183 security 6655 network 11123 training 28133 | |
| amatis.nl | Amatis Information Technologies | The company specializes in developing autonomous intelligence systems that can think, learn, and act independently, focusing on domain-specific Agentic AI. Amatis provides a diverse portfolio of services including Artificial Intelligence, Smart Engineering, Digital Transformation, and product design & development, aiming to improve operational efficiency and drive innovation. They boast over 20 years of international experience and operate as a registered R&D center, offering 360° service competency and serving clients in sectors such as Healthcare, Aerospace, and Automotive. | Technology → Data Science & Analytics 3748 | data analytics 63 software engineering 82 digital transformation 215 artificial intelligence 291 | |
| h4ck3r8ros.nl | H4CK3R8ROS | The website sells hacking tools, such as the Flipper Zero, HackRF One, and USBNinja, from various brands. It has a blog with articles on topics such as security, penetration testing, and blockchain technology (Solana). Examples of articles include about ESP32, smart thermostats, rolling codes, RFID technology, WiFi hacking, and cryptocurrency (Solana). | Technology → Electronics & Components 11261 | nfts 26 blog 13392 | |
| allinco.nl | Allinco | Allinco is an ICT specialist with expertise in network challenges and offers a variety of services and solutions. The website describes Allinco’s core values, such as connectivity, security, and flexibility, and the benefits they offer to customers. Allinco provides a wide range of ICT services, including cloud services, TV services, telephony, Wi-Fi, security, and infrastructure, and features testimonials from various companies (including INOS, Chassé Hotel, and Montapacking). | Business Software → Productivity Tools 416 | testimonials 416 cloud 1527 security 6655 network 11123 | |
| zeta.nl | ZETA | ZETA helps companies identify cyber risks through penetration tests and secure data center solutions. The website offers a wide range of services, including VPS, dedicated servers, co-location, backup and disaster recovery, domain names, email, internet and telephony. ZETA offers ethical hacking, penetration testing, web application testing, network and infrastructure testing, and 24/7 security monitoring. | Computing → Data Centers 64 | penetration testing 43 data centers 46 backup 494 cybersecurity 688 monitor 1063 security 6655 | |
| cybernetwerkzhe.nl | Stichting Cybernetwerk Zuid-Hollandse Eilanden | The foundation gathers relevant knowledge, partners, and tools to help businesses better protect themselves against cybercrime. They offer various services, such as knowledge gatherings, webinars, a free vulnerability assessment, and advice sessions, to develop a cybersecurity strategy. CybernetwerkZHE is a non-profit organization that, by connecting knowledge, tools, and partners, brings digital security closer to businesses. | Financial Management → SME 161 | digital security 18 cybercrime 87 knowledge 3528 partner 4272 network 11123 | South-Holland → South-Holland Islands 34 |
| goddog.nl | Boldcode | The site supports various development technologies, including Alphine.js, Filament CMS, Laravel, Livewire, Tailwind CSS, and Three.js, facilitating the creation of web applications and portfolios. It offers a Digital Asset Management (DAM) package for Filament, allowing organizations to manage and distribute digital assets efficiently. Additionally, the website features a digital clubhouse for the Instituut voor Publieke Waarden, focused on exploring the future of public affairs and supporting reed quintets through a multi-tenant networking platform. | Initiatives & Projects → Nonprofits 750 | filament 77 networking 842 webshop 8648 | |
| blueprintsecurity.nl | Blueprint Cyber Security | The company specializes in penetration testing, social engineering, and cybersecurity awareness training. Blueprint Cyber Security provides ISO 27001 consultancy and bug bounty management, alongside incident response support. The company is committed to delivering exceptional IT security services and maintaining a high standard of service quality through rigorous processes and a curated team of IT security professionals. | Information Technology → IT Security 980 | incident response 15 iso27001 22 penetration testing 43 | |
| sth.nl | STH | STH specializes in providing reliable ICT solutions, including workplace management and cybersecurity. The services include telephony, internet connections, and managed wifi, with a focus on security, hosting, and a modern workplace. The company emphasizes a customer-centric approach, offering solutions that are directly applicable and support the client’s ambitions. | IT → System Administration 610 | ict solutions 15 telephony 494 cybersecurity 688 internet 1678 work 3122 | |
| wibs.nl | Wibs Digital | The agency provides digital asset development services, focusing on seamless integration with existing systems to enhance efficiency and productivity. They offer enterprise cybersecurity solutions that include maintenance, upgrade, implementation, and advisory services to protect businesses from cyber threats. Wibs Digital also delivers IT consultation and strategy, encompassing digital transformation, infrastructure assessment, and marketing strategy, aimed at unlocking the potential of technology for businesses. | Data Analysis → Business Intelligence 1002 | business intelligence 227 cybersecurity 688 innovation 4659 | South-Holland → The Hague 19898 |
| nedkom.nl | Nedkom B.V. | Nedkom B.V. was founded in 2016 with experience in the healthcare market and a goal to implement an alternative approach to communication alongside existing care systems. The company offers services such as NEN Silent Alarm, personal safety with location tracking, and nursing call systems. They focus on providing solutions based on smartphones and smart apps. Nedkom B.V. has expertise in silent alarming compliant with NEN2575 and implements these solutions in healthcare facilities with the help of a team of 12 people. | Security → Access Control 253 | alarm 377 smartphone 1344 healthcare 2316 communication 10162 | |
| lindavantol.nl | Linda van Tol | Linda van Tol is a web developer specializing in WordPress maintenance, technical support, security, and website optimization. The website provides assistance with issues such as website maintenance, hacked websites, slow websites, and website technology, as well as automations and migrations. The website gives insight into Linda van Tol’s background, her education, and her experience as a freelancer, with a passion for IT and animals. | | technical support 107 automation 2682 wordpress 3551 security 6655 maintenance 20093 | |
| boldcode.nl | Boldcode | The site features several projects, such as the Open Development platform, which provides tools for public sector innovation and a digital clubhouse for the Instituut voor Publieke Waarden. It also includes a multi-tenant webshop specializing in unique, self-made products like art, design, and books. Furthermore, the site offers a Filament DAM package for managing digital assets, alongside a portfolio website for musician Rafael Altman. | Software Development & Engineering → Game Development 287 | dam 63 filament 77 asset 591 webshop 8648 | |
| htx.nl | HTX Home | HTX Home is part of the Fortezza Group and offers IT foundation solutions, cybersecurity, and smart workplaces. The company focuses on helping SMEs grow by optimizing their IT environment and proactively preventing problems. HTX Home’s approach consists of defining a strategic roadmap, directly identifying risks and improvement opportunities, and delivering service management. | Digital Media & Design → Digital Transformation 954 | roadmap 125 cybersecurity 688 workplace 1046 risk 2896 | |
| montelbaan.nl | Montelbaan | The company has over twenty years of experience and focuses on delivering solutions in niche technology. Montelbaan offers services that significantly exceed the lifespan of technologies and avoid vendor lock-ins. The services include biometrics, cryptography, data science, risk analysis, and architecture. | Consulting → Technical Consulting 382 | biometrics 11 cryptography 31 data science 193 risk analysis 217 architecture 3223 technology 6816 | |
| binsec.nl | B!ns3c | The blog features articles and write-ups related to Capture The Flag (CTF) competitions, documenting solutions and techniques. It includes walkthroughs and analyses of investigations conducted by Bellingcat, focusing on topics like art theft and financial fraud. The blog also provides write-ups for machines from the Hack The Box platform, aiming to train ethical hacking and penetration testing skills. | Information Technology → IT Security 980 | ctf 10 investigation 400 cybersecurity 688 | |
| vinotechniek.nl | Vinotechniek | The company provides various services, including network management, firewall & switching, patching, Wi-Fi solutions, and NAAS, aimed at providing reliable and secure IT solutions. Vinotechniek offers expert installation, configuration, and management of Wi-Fi and networks using high-end solutions, with attention to security operations, network access control, and 24x7 monitoring. Clients appreciate the personalized advice, strategic IT advice, and the guarantee of a fast and stable network, including optimal Wi-Fi coverage. | IT → Network Management 702 | firewall 51 wifi 1372 security 6655 network 11123 | |
| bastiaansierd.nl | Bastiaan Sierd | Bastiaan Sierd de Jong describes his activities as an ICT student, web developer, and fan of technology and IoT, including projects such as an IoT alarm system and a lab power supply developed during his studies. He documents various projects, including a 3D modeling and printing project, a website for his sister (Eva-deJong.nl) which is an exercise in minimalism, and several Java loggers. Bastiaan has also worked on web projects, such as LesAglires.nl (a website for an accommodation in the Ardennes), RomeinseReizen.nl (a project with his father focused on Roman history), and Rádió Magyarul – A Hungarian Internet Radio. | Technology → ICT 486 | java 176 iot 183 web development 965 electronics 971 | |
| cyberpeak.nl | CyberPeak | CyberPeak aims to bring the cybersecurity of Dutch businesses to the highest level. The company offers various services, including managed security, consultancy and cyber assistance, to protect businesses from online threats. CyberPeak considers itself a strategic partner helping businesses achieve sustainable performance in the digital domain. | IT Security → Business Security 18 | business software 31 cybersecurity 688 consultancy 2596 | |
| apexsecurity.nl | APEX Security | The website offers a range of security solutions, including Managed Detection and Response (MDR) and Managed Network Services, as well as professional services such as Technology Consulting, Assessment Services, Design & Implementation, and Support Services. APEX Security works with partners like Fortinet, Tenable, Splunk, SentinelOne, Knowbe4, and Wazuh, offering technologies like Endpoint Protection, Vulnerability Management, Firewall Log Analysis, Security Monitoring, ZTNA/SASE/SD-WAN. The company positions itself as a leading cybersecurity service provider in the Netherlands, focusing on 24/7 monitoring, threat detection, and rapid response. | | security solutions 23 managed services 95 cybersecurity 688 | |
| bserved.nl | BServed Hosting | BServed Hosting has decided to discontinue its operations as of October 2023. This decision was necessitated by a ransomware attack that damaged the company’s systems. Customers can still contact their primary contact person with any questions. | Business & Industry → Business News 468 | ransomware 41 operation 480 hosting 3125 | |
| stuwkrachtinnovaties.nl | Stuwkracht Innovaties | The company, Stuwkracht Innovaties, specializes in improving project management processes within the manufacturing industry, addressing challenges such as scope management, stakeholder, and risk management. The website highlights the high costs often associated with inefficient project management in the manufacturing industry, estimates ranging from 10-15% of the annual project value for machine builders. Stuwkracht Innovaties offers practical training, analysis, and advice, facilitating the transition of project management teams to professional methods, with a focus on grip, speed, and success. | | manufacturing 396 budget 1335 risk 2896 training 28133 | |
| cyberseals.nl | Cyber Seals | Cyber Seals offers a wide range of services, including penetration testing (including IT infrastructure, cloud, applications and WiFi), social engineering, vulnerability scans, and consultancy. The website describes a unique approach: ‘Cyber Security with a Hacker’s Mindset’, where vulnerabilities in systems are identified and sealed to guarantee digital security. In addition, Cyber Seals offers workshops, demos and consultancy on areas such as SOC, SIEM, compliance, privacy and identity management, and focuses on diverse sectors such as SMEs, software development, manufacturing, government, education and healthcare. | Information Technology → IT Security 980 | penetration testing 43 consulting 3639 | |
| proteqtor.nl | ProteQtor | ProteQtor manages the rollout, management and security of digital workplaces, utilizing cybersecurity products and security awareness training. The company offers solutions for SMEs and large companies, from standard to customized projects, focusing on creating safe workplaces where employees can work securely from anywhere, anytime. The website provides information about cybersecurity, how to set up safe digital workplaces, and how to improve IT system security. | IT → Managed Services 720 | digital workplace 30 cybersecurity 688 monitor 1063 software 8291 training 28133 | |
| degroot-it.nl | De Groot IT | The website presents an experienced freelance consultant specializing in cybersecurity, networking, and cloud solutions. The consultant’s expertise covers various areas including cloud infrastructure (AWS, Azure), cloud security (Check Point, Cisco), and on-premise networking technologies. Services offered include network and security design, network monitoring with tools like Zabbix, and solutions for network access control using platforms like Aruba ClearPass. | | cybersecurity 688 networking 842 cloud 1527 consultancy 2596 security 6655 network 11123 | |
| securable.nl | Securable Cyber Security | The website describes the dangers of digital attacks such as hacking, malware, and phishing, and the need for cybersecurity for businesses. Securable offers a range of services, including Security Assessments, Penetration Tests, Security Dashboards (SIEM), and Secure Portals, aimed at increasing digital security. The company emphasizes the importance of awareness and offers Security Awareness Training to help employees recognize and prevent cybersecurity threats. | Information Technology → IT Security 980 | threat 62 cybersecurity 688 environment 4873 security 6655 | |
| trustforce.nl | Trustforce B.V. | The company offers services in areas such as cybersecurity, data privacy, and education, including risk assessment, security advice, and certification courses. Trustforce specializes in protecting digital assets and ensuring the safety of businesses, with solutions like risk management, ransomware prevention, and AVG compliance. The company works with international companies, such as the Belgian Centre for Nuclear Research (SCK CEN), to mitigate cybersecurity risks for critical infrastructure in the Middle East. | Insurance & Risk → Risk Management 1060 | risk 2896 data 5872 security 6655 training 28133 | |
| schotte-it.nl | Schotte-IT | Schotte-IT supports SMEs in optimizing and managing their IT infrastructure and offers advice on IT strategy and security. The services include IT infrastructure, IT consulting, cybersecurity solutions, and cloud solutions, aimed at strengthening SMEs' resilience against cyberattacks. The website provides an overview of services such as modern workplaces, Microsoft 365, IT Support & Management, Hosting & Domains, Infrastructure & Optimization and Cybersecurity for SMEs, as well as blog posts and contact information. | IT → Managed Services 720 | it-infrastructure 19 cloud solutions 281 microsoft 365 430 cybersecurity 688 | South-Holland → The Hague 19898 |
| fidoa.nl | Fidoa | Fidoa's consultancy services focus on strategic and tactical levels within digital transformations, involving partnerships across a diverse range of sectors. Fidoa offers independent advice on suppliers, contracts, and environments, including selection programs and NIS2 compliance. An annual conference, Kennis & Connect, has brought together a broad network of relationships from sectors such as aviation, industry, healthcare, and logistics, discussing topics such as network manufacturers and architecture. | Government & Administration → Legislation 432 | network infrastructure 12 nis2 27 cybersecurity 688 trust 1147 architecture 3223 consulting 3639 | |
| innico.nl | Innico | The software integrates sales and operational processes and offers tools for forecasting, inventory management, quotation creation, and pricing management, without using spreadsheets. The company also provides customized consultancy and cybersecurity solutions to help businesses optimize their processes and protect against threats. The software is designed with a modern user interface and offers direct integrations, with the customer at the center of needs planning. | Events & Hospitality → Planning 663 | operation 480 cybersecurity 688 consultant 706 sale 5930 security 6655 software 8291 | |
| remcokersten.nl | Remco Kersten | The blog covers a wide range of topics, including building a home SOC with open-source tools, troubleshooting SELinux issues, importing data into Longhorn, and developing AI applications like a dental invoice chatbot. Remco shares practical guides and tutorials on various technologies and tools, such as Wazuh, MISP, Cortex, Shuffle, Trello, Microsoft Planner, Longhorn, and Azure Entra ID. Additionally, the website includes articles on security topics like setting up a certificate authority with Step-CA and troubleshooting ChatGPT loading issues, alongside information about PNPT certification. | Computer Science → Networking 809 | chatgpt 128 devops 197 networking 842 security 6655 | |
| absolutesecurity.nl | Absolute Security B.V | The company offers consultancy services including ransomware readiness, cloud security, and security program & strategy, along with managed services and risk-reduction-as-a-service. Absolute Security analyzes business risks, creates insight into these risks, and provides tailored solutions to prevent cyberattacks and minimize their impact. Services include Secure Access Service Edge, Secure Isolated Recovery Environment, and managed security product administration, as well as certified expertise for the client. | Insurance & Risk → Risk Management 1060 | attacks 12 risk 2896 strategy 9379 | |
| auditenco.nl | Audit & Co | Audit & Co is an audit-only firm focused on collaborations with other accounting offices. The firm offers legal audits of financial statements and IT audits, with the client remaining responsible for other services to the client. The website emphasizes a co-creation approach, encouraging collaboration between Audit & Co, the client, and their clients. | Accounting → Auditing 176 | co-creation 134 data analysis 211 financial statement 321 audit 622 collaboration 16036 | |
| boblelieveld.nl | BL IT-Consultancy | Bob Lelieveld is an experienced freelance IT Security manager specializing in Cyber Security and possesses extensive background in diverse industries including military, finance, healthcare, and high-tech. He offers a range of services, including security consultancy, project management, and interim management, focusing on pragmatic and effective solutions to complex security challenges. Lelieveld emphasizes the importance of clear communication and teamwork for successful project outcomes, leveraging his combined technical expertise and leadership skills. | Community → Government & Administration 10567 | teamwork 497 cybersecurity 688 consultancy 2596 project management 3423 security 6655 communication 10162 | |
| ccvt.nl | Centrum voor Cybersecurity Veiligheid en Technologie | The CCVT monitors the activities of cybercriminals, hacktivists, and state actors via a central portal. The services offered include collecting, analyzing, and interpreting threat information, and providing targeted support and advice. The center offers services such as deep web monitoring, dark web monitoring, and credential leak monitoring to protect organizations against cyberattacks and data breaches. | Information Technology → IT Security 980 | threat 62 monitor 1063 | |
| ctrlcloud.nl | CtrlCloud | The website describes CtrlCloud as a partner that 'delivers the ship' – the basic infrastructure for a modern workplace and online servers – while the customer maintains control. CtrlCloud offers cloud services, including Microsoft 365 integration via Teams, SharePoint, and OneDrive, with a focus on mobility and security. The organization provides cybersecurity programs to foster a security-first culture within companies and maintain operational IT in-house, while specialized knowledge is outsourced. | Software & Computing → Cloud Computing 1253 | business data 12 microsoft 365 430 cybersecurity 688 cloud 1527 it 1539 balance 4582 | |
| dfirsec.nl | Lennaert Oudshoorn | The blog features write-ups from security challenges (CTFs) like 'PlaySecure CTF' and describes Lennaert's attendance at events such as 'BeerCon2'. A post details Lennaert's setup of a Kali Linux environment, intended to provide a baseline for tutorials and showcase his work. The initial blog post introduces Lennaert, his background from Amsterdam, and the type of content readers can anticipate, including his cybersecurity activities. | Social → Personal Blog 2718 | incident response 15 conference 763 environment 4873 security 6655 blog 13392 | |
| flexinit.nl | Flexinit BV | The website showcases various types of web hosting, including shared hosting, virtual machines, dedicated servers, and game servers, as well as solutions for application hosting and cloud hosting. Flexinit BV also offers services specifically focused on business automation and cybersecurity, including integrations with Microsoft 365, WordPress, Hubspot, and Joomla. In addition to the services themselves, the website contains information about Flexinit BV's operations, including about us, contact details, and a blog with relevant articles. A free migration is offered upon switching from another provider. | IT → Managed Services 720 | cloud hosting 27 migration 349 cybersecurity 688 webhosting 948 provider 1111 | |
| redventure.nl | RedVenture | RedVenture focuses exclusively on security issues and offers a diverse range of security assignments. The website provides job vacancies, filters by location (Limburg, North Holland, South Holland, Amsterdam, The Hague, Leiden), and an overview of clients. RedVenture guarantees transparency in margins, agreements, and rates and offers guidance throughout the security process. | HR Services → Intermediaries 140 | intermediary 95 assignment 1121 partner 4272 vacancy 6598 security 6655 | South-Holland → The Hague 19898 |
| securitystaffing.nl | Security Staffing.nl | The website offers a platform for clients seeking professionals in the cybersecurity industry. The company provides training and coaching for internal security specialists. SecurityStaffing.nl offers direct support with compliance issues and business continuity incidents. | Financial Services → Compliance 399 | business continuity 33 compliance 506 risk management 543 cybersecurity 688 | |
| codeguardian.nl | Code Guardian | The website outlines Code Guardian's services, which include Managed Application Security, Security Consultancy Services, and a Security Quick Scan. These services aim to proactively protect applications through continuous monitoring, offer expert advice on security architecture, and rapidly identify urgent security risks. Code Guardian emphasizes a focus on continuous security, allowing client teams to concentrate on development while handling security triage and analysis, founded by engineers with a goal to address common security issues. | Information Technology → IT Security 980 | scan 790 consultancy 2596 application 3377 security 6655 | North-Holland → Amsterdam 41253 |
| cyber-analytics.nl | TU Delft | The lab focuses on extracting knowledge from software data through analysis, anomaly detection, and classification/intrusion detection techniques. Researchers develop learning algorithms, particularly for white-box models like decision trees and state machines, ensuring they are understandable by developers and security analysts and robust against evasion. Recent achievements include student publications at various conferences (AST 2025, BNAIC 2024, ICSE 2024, CIAA 2024, IJCAI 2023, ICGI 2023) and the successful completion of the H2020 AssureMOSS project. | Data Science & Analytics → Artificial Intelligence 1831 | algorithms 186 data science 193 artificial intelligence 291 cybersecurity 688 software 8291 | |
| dutchitchannel.nl | Dutch IT Channel | The website features news articles on topics such as cybersecurity, cloud computing, software licensing, and telecommunications. It also includes job vacancies for IT professionals, as well as information about events such as the Dutch IT Channel Golf Cup. The site covers topics including the Broadcom-VMware acquisition, Microsoft's security issues and the rise of AI and cloud technologies. | | job postings 676 cybersecurity 688 cloud 1527 it 1539 software 8291 news 15293 | |
| securitydelta.nl | Security Delta (HSD) | Security Delta (HSD) is a collaborative effort involving over 300 organizations, including companies, government bodies, and research institutions, since 2013. The cluster’s primary function is to provide access to knowledge, innovation, markets, finance, and talent, enabling the development and scaling of security solutions both domestically and internationally. HSD aims to strengthen the Dutch economy, boost employment, and enhance the country's overall security posture through collaborative initiatives and innovation. | Economy → Economic Development 11 | cluster 81 economy 682 knowledge 3528 talent 3987 innovation 4659 security 6655 | |
| faqt.nl | Nationale Media Groep (NMG) | The magazine publishes factual articles covering diverse areas of life, including science, fashion, travel, and entertainment. The website features profiles of well-known individuals, such as Fresia Cousiño Arias (ESPN) and Dave Maasland (ESET Nederland), who are relevant to news and discussions. Practical tips and ideas are also presented, such as suggestions for fun challenges, activities, and creative projects with egg cartons. | Periodical Publications → Magazines 1001 | science 491 challenge 1697 magazine 2182 creativity 2531 lifestyle 2918 travel 7210 | |
| flowerbed.nl | Flowerbed Engineering | The website describes Flowerbed's services, including IT management, security, support, and outsourcing, focused on achieving business goals. Flowerbed partners with various companies, such as Arctic Wolf, Fortinet, Trend Micro, Microsoft, and KnowBe4, to offer a wide range of security solutions. The website also promotes internal initiatives, like the Capture The Flag cybersecurity challenge, and the history of the partnership with DataExpert. | | it 1539 security 6655 strategy 9379 collaboration 16036 | North-Holland → Haarlem 8674 |
| tesorion.nl | Tesorion | The website offers a wide range of services, including EDR, MDR, NDR, Pentest and Security behavior, focused on providing comprehensive cyber protection. Tesorion also presents areas of expertise such as Security Operations, Security Advisory, Consultancy, Offensive Security, Red Team and Incident response, as well as an interactive talk show called T-Talks. The website includes an overview of important cybersecurity standards, themes such as identity management and ransomware, as well as information about partners, vacancies and publications about cybersecurity and current threats. | | threat 62 cybersecurity 688 protection 728 | |
| fullcontact.nl | Fullcontact Offshore ICT | Established in 1998, Fullcontact has grown to include a team of information experts and offers a complete package of services for software development. The company specializes in delivering high-quality custom software, offering design, development, full product lifecycle support, and dedicated resources to clients in sectors such as Finance, Telecom, and Healthcare. Recent projects include blockchain technology implementation for Healthcare focused on data protection and patient control, as highlighted in a 2017 news article. | Technology → Data Science & Analytics 3748 | blockchain 250 resources 310 software development 358 healthcare 2316 consultancy 2596 finance 5341 | North-Holland → Amsterdam 41253 |
| digitaleopsporing.nl | Digitale Opsporing | The company combines years of expertise with the latest technologies to support businesses and government agencies with various services, including software, training, cybersecurity, and digital investigation. With the iRC cloud solution, Digital Investigation offers a secure and GDPR-compliant way to conduct internet research, including automated searching in various sources. The company provides various training courses, such as OSINT, IRC, and Crypto training, and offers protection against digital threats through penetration tests and disaster recovery plans. | Information Technology → IT Security 980 | irc 16 gdpr 179 cybersecurity 688 software 8291 training 28133 | Horst aan de Maas → Horst 454 |
| typ.nl | Typ | The site offers a job search function, candidate listings, and employer listings. Typ uses a unique approach that pairs candidates with companies based on individual skills and attitude, ensuring the candidate always finds the best job. The website describes a network of recruiters with in-depth knowledge of companies, culture, and teams, to guarantee a better match and share testimonials from professionals confirming the effectiveness of the approach. | | candidate 1896 recruitment 2015 job 2795 match 3471 network 11123 | |
| wietzebeukema.nl | Wietze Beukema | The website showcases Wietze Beukema's blog posts and presentations on topics related to cybersecurity, including command-line obfuscation, DLL hijacking, PowerShell obfuscation, and attacker emulation. He documents his research and presentations from various conferences and workshops, such as DEF CON, BSides, Nullcon, and SANS DFIR Summit. Wietze’s work demonstrates an interest in bypassing detection methods used by security tools (EDRs) and exploring techniques to compromise Windows systems. | | presentation 1785 research 8967 | |
| cert-wm.nl | Het Waterschapshuis | CERT-WM is a collaboration between 21 water authorities and Rijkswaterstaat focused on strengthening operational information security. The CSIR (CyberSecurity Implementation Guideline) is developed to secure water treatment plants, mills, bridges, dikes, sluices, etc. CERT-WM offers a range of services, including incident advisory, vulnerability scanning, and forensic investigation. | Nature Conservation → Water Management 1138 | water authority 58 vulnerability 149 information security 217 incident 335 objects 426 technology 6816 | Utrecht → Amersfoort 8011 |
| zawadidone.nl | Zawadidone | The blog features recent posts covering a range of DFIR subjects, including timeline analysis using tools like Dissect and Timesketch, automation of DFIR processes with cloud services, and Docker image creation. Several posts detail specific ransomware analyses, such as Mount Locker, explaining their encryption methods (Chacha20 and RSA-2048). The blog also includes a post about preparing for the Certified Kubernetes Application Developer (CKAD) exam, sharing the author's experiences and study tips. | Software Development & Engineering → DevOps 429 | ransomware 41 docker 111 timeline 149 cloud 1527 automation 2682 | |
| jonyschats.nl | Jony Schats / 0xjs | The website features reviews of cybersecurity courses, specifically the Certified Enterprise Security Professional (CESP) course from Altered Security, which focuses on Active Directory Certificate Services (ADCS). A series of blog posts discuss various aspects of ethical hacking and security, including identifying privileged identities, examining multi-factor authentication (MFA) status, and exploring service principals in Azure. The site also covers reviews of cybersecurity certifications, such as the PentesterAcademy Certified Enterprise Security Specialist (PACES) exam, highlighting the resources provided by PentesterAcademy, including a simulated Global Central Bank (GCB) lab. | Computer Science → Networking 809 | active directory 14 azure 222 certification 3380 security 6655 | |
| midnightblue.nl | Midnight Blue | The company conducts research across domains including Cyber Physical Systems (CPS), communications, and security equipment. Midnight Blue provides a range of consultancy services, including vulnerability research, reverse engineering, and defensive design to help clients address various threats. Recently, they identified and reported a zero-day vulnerability, RISK:STATION, in Synology devices, urging users to install the available patch to prevent potential security breaches. | Information Technology → IT Security 980 | embedded systems 47 consultancy 2596 risk 2896 | |
| blogit.nl | BlogIT | The British government recently announced that data centers are being classified as critical national infrastructure, similar to energy companies. Since the end of May, the Australian government has mandated that large organizations report any payment as a result of cyber extortion within 72 hours. Gasunie, in collaboration with Deloitte and SAP, has taken a crucial step in its digital transformation, going live on October 1, 2024. | Business & Industry → Business News 468 | data centers 46 transformation 1081 | |
| laatjeniethackmaken.nl | laatjeniethackmaken.nl | The website explains how to protect oneself from hackers on various devices, including computers, phones, and tablets. The content covers topics such as what hackers are, the basic principles of computer security, and specific risks like ransomware and breaches via social media. The website offers practical tips to minimize the chance of successful attacks and explains the differences between white hat and black hat hackers. | Electronics & Components → Computer 4084 | hacker 17 internet 1678 computer 1969 social media 3342 security 6655 | |
| wnas.nl | wnas | Wilfred details his professional background, including roles as a graphical designer, front-end developer, and product owner. He has worked with a diverse range of clients, such as ANWB, ABN-AMRO, ING, KLM, Avans, Cito, and Essent. The site features a collection of blog posts covering topics related to web development, including browser support, backlog management, and front-end testing. | Software Development & Engineering → Programming Languages 735 | browser 139 post 140 developer 406 testing 456 blog 13392 | |
| ctrl-alt-dev.nl | E.Hooijmeijer | The site features sections such as 'About,' 'Conferences,' 'Projects,' 'Articles,' and 'Contact,' offering a variety of content related to software development and cybersecurity. Erik's projects include a maize maze design software developed as a result of designing a physical maize maze for COVID safety, and a game called 'Overthrown,' a VIC-20 action game. He also presents technical talks, such as one on decompiling Kotlin code, that were well-received at NL-JUG events. | Software Development & Engineering → App Development 1084 | kotlin 14 webapp 136 java 176 workshop 19325 | |
| koopzondagonline.nl | Sissy-Boy | The website addresses sustainable packaging options for small businesses, and discusses how businesses can make environmentally conscious choices regarding packaging. The website presents the top 5 cybersecurity threats for e-commerce stores in 2024, and offers tips on how to protect e-commerce businesses. The website offers interior decoration items, including photo frames, candles, and lamps, aimed at creating a cozy and atmospheric living environment. | IT → Managed Services 720 Antiques & Collectibles → Vintage 623 | photo frames 62 blouse 173 cybersecurity 688 packaging 2236 interior 8093 sustainability 18451 | |
| cqure.nl | Cqure | The company has extensive experience since the 1990s, offering cyber security and privacy services. Cqure focuses entirely on cybersecurity & privacy and possesses the expertise and skills to keep organizations safe, with a network of technical specialists, strategic advisors and practical employees. Cqure’s core values are reliability, expertise, pragmatism, and decisiveness, which they use to build digital security. | | cybersecurity 688 professionals 1966 security 6655 | |
| sosecure.nl | SoSecure | SoSecure offers training courses, consultancy services, and training programs on topics such as Predictive Profiling, Red Teaming, CTER (Counter-Terrorism, Extremism and Radicalization), and other security areas. The organization provides services including fraud detection, anti-money laundering, financial intelligence, and internet crime research. SoSecure is driven by the desire to contribute to a safer Netherlands by training professionals and providing proactive security solutions. | Technical → Security 408 | terrorism 10 consultancy 2596 risk 2896 security 6655 training 28133 | |
| hayobethlehem.nl | Hayo Bethlehem | Hayo Bethlehem, a resident of Europe, has been actively online for over 30 years and currently advises on digital matters within the Dutch government. The website features a collection of articles, reviews, and a personal journal documenting his reading habits and cybersecurity-related insights. Recent content includes articles on WordPress security, cybersecurity risks, and book reviews, reflecting Hayo Bethlehem’s areas of expertise and ongoing interests. | Periodical Publications → Magazines 1001 | journal 294 cybersecurity 688 wordpress 3551 article 6000 security 6655 | |
| 2bsupport.nl | 2B Support | The website offers affordable hosting and domain registration starting from just over 1 euro per month, including free SSL via Let's Encrypt and VAT. 2B Support provides web design services with CMS functionality, allowing users to easily customize their websites without programming knowledge. The website is an official reseller of the ESET antivirus scanner, which consistently scores highly in tests by the Consumer Association (Consumentenbond), and also offers Microsoft hosted exchange environments and Dropbox licenses. | Web Hosting → Hosting Providers 1075 | antivirus 74 ssl 132 domain 1811 hosting 3125 software 8291 | |
| jvdham.nl | University of Twente | Dr. van der Ham's research focuses on vulnerability prioritization and management, incident response, and the ethical considerations within cybersecurity. Prior to his academic position, he worked at the National Cyber Security Centre-NL, contributing to the NCSC Research Agenda and playing a key role in coordinated vulnerability disclosure efforts during significant cybersecurity events like WannaCry and Log4J. His expertise extends to cybersecurity incident response, reflected in his involvement with organizations like the ACM Digital Threats journal, the FIRST community, and the development of ethical codes for incident and security teams. | University Resources → University Professors 35 | incident response 15 ethics 119 vulnerability 149 cybersecurity 688 research 8967 | |
| joostrijneveld.nl | Radboud University | Joost Rijneveld was a PhD candidate at Radboud University, Nijmegen, focusing on software implementations of post-quantum cryptography from 2015 to 2019. Since 2020, his work has shifted towards technical threat intelligence, digital forensics, and reverse engineering. The website contains write-ups from various Capture The Flag (CTF) competitions, puzzle hunts, and technical tutorials, including a dishwasher repair guide. | Computer Science → Cryptography 27 | cryptography 31 reverse engineering 34 challenge 1697 | Gelderland → Nijmegen 9384 |
| wandernauta.nl | Patchman B.V. | Wander Nauta is a software engineer based in Enschede, Netherlands, with experience in Python (Django), C++, and web security. His professional experience includes work in small agile teams focusing on web hosting and security, utilizing technologies like Git, Java, JavaScript, and AWS. He also contributes to open-source security research, has a Master's degree from the University of Twente, and previously worked at Patchman B.V. developing automated vulnerability patching solutions for WordPress. | Computer Science → Software Engineering 404 | c++ 25 python 167 thesis 228 webhosting 948 software 8291 | Overijssel → Twente 2578 |
| hermanslatman.nl | Herman Slatman | Herman Slatman is currently developing 'Holmes,' a secure router designed to provide users with greater insight and control over their home network. He completed his specialization in Computer & Information Security, known as the Kerckhoff's Institute, at the University of Twente between 2009 and 2016, a collaborative program involving several universities. Slatman's interests include computer and information security, e-commerce, machine learning, and internet technology, and he has experience with various web development platforms like WordPress, Magento, and Drupal. | Science → Computer Science 2413 | router 128 university 593 security 6655 software 8291 network 11123 | Enschede → Calslaan 52 |
| orangecon.nl | OrangeCon | The conference, scheduled for September 5th, 2025, aims to connect cybersecurity professionals and enthusiasts through talks, workshops, and community villages. Attendees can submit proposals for talks and workshops, covering a wide range of security topics, from blue and red teaming to policy and emerging technologies. The conference features keynote speaker Ellen Mok, focusing on digital sovereignty, and fosters a collaborative environment for sharing knowledge and experiences within the Dutch cybersecurity community. | Social Support → Online Communities 859 | talks 37 submission 113 conference 763 speaker 1481 community 7931 workshop 19325 | Amsterdam → Nieuw-West 844 |
| compact.nl | KPMG Netherlands | The website features articles and analyses covering topics such as low-code AI accessibility, data literacy, EU AI regulations, and the intersection of technology and environmental, social, and governance (ESG) goals. Recent articles explore themes like radicalization detection through algorithms, data management for CSRD compliance, and the importance of software continuity. The publication includes a variety of perspectives from authors including experts in data science, cybersecurity, and ESG, showcasing the breadth of KPMG’s thought leadership within these domains. | Data Science & Analytics → Artificial Intelligence 1831 | esg 83 machine learning 173 cybersecurity 688 ai 2181 data 5872 software 8291 | |
| cyberveilignederland.nl | Cyberveilig Nederland | The organization collaborates with its members, primarily cybersecurity service providers, to enhance quality and transparency within the sector. Cyberveilig Nederland regularly publishes position papers, threat assessments, and press releases to share knowledge and raise awareness of important developments and challenges in cybersecurity. A key part of their activities is Project Melissa, which publishes best practices regarding secondary victimization. | Associations & Groups → Industry Associations 548 | threat 62 cybersecurity 688 sector 1332 knowledge 3528 member 10154 | |
| womenofwicca.nl | WICCA | WICCA, an association of women in cybersecurity, is based in the Netherlands and Ireland and comprises over 1,000 members. The organization's core values include worth, inclusion, transparency, charity, and hospitality, aiming to inspire and empower women in cybersecurity. WICCA engages with various organizations such as individuals, companies, governments, and universities to foster a robust network of women in the cybersecurity sector. | Initiatives & Projects → Nonprofits 750 | cybersecurity 688 knowledge 3528 community 7931 member 10154 network 11123 event 45199 | |
| intersct.nl | NWO NWA INTERSECT | The website highlights the increasing reliance on information and communication technologies and the associated cybersecurity risks, particularly with the proliferation of IoT devices. The 2025 INTERSCT conference, organized by the NWO NWA INTERSECT program, will address cybersecurity of Internet-of-Things at Radboud University Nijmegen on June 16, 2025. The growth of IoT devices presents significant security vulnerabilities due to their widespread use, lack of control in their development, and the potential for these devices to impact both our economy and our lives. | Computer Science → Networking 809 | internet of things 18 cybersecurity 688 device 698 conference 763 risk 2896 | Gelderland → Nijmegen 9384 |
| pcsi.nl | Partnership for Cyber Security Innovation | PCSI plays a central role in creating a secure and resilient digital environment in the Netherlands. The organization facilitates an innovation ecosystem where partners collaborate on cybersecurity projects, including proof-of-concept studies, exploit research, and quantum-safe cryptography. PCSI offers various partnership programs, such as core partnerships and liaison partnerships, and hosts events and podcasts to share knowledge about cybersecurity developments. | Community → Government & Administration 10567 | cybersecurity 688 partnership 1407 podcast 3328 innovation 4659 newsletter 6504 | |
| joranhonig.nl | Joran Honig | Joran Honig, a security researcher at Consensys Diligence, shares his expertise and insights on DeFi security research through various articles and guides. The website offers a range of resources, including tutorials on bug hunting techniques, strategies for identifying promising bounty targets, and explanations of key concepts like game theory and oracle vulnerabilities. Content covers topics like smart contract security analysis, mutation testing, and reverse engineering, aiming to equip users with the knowledge and tools needed to excel in the web3 security landscape. | Investing → Cryptocurrency 776 | defi 10 smart contract 11 oracle 97 | |
| jorgeliauw.nl | Xebia | Jorge Liauw Calo is a Google Cloud Security Architect with over 12 years of experience in Cybersecurity and Cloud, currently working at Xebia. The website focuses on assessing and improving the security of Google Cloud workloads and data, covering areas like infrastructure, networking, and compliance. A key component of the site is the Google Cloud User Group Benelux, co-organized by Jorge Liauw Calo and his colleagues at Xebia, providing a platform for Google Cloud enthusiasts to connect and learn. | Web Design & Development → Web Services 413 | cloud 1527 security 6655 | |
| itexecutive.nl | IT Executive | The website offers news, background articles, and opinion pieces on topics such as cybersecurity, data & digital, cloud technology, and digital transformation. IT Executive provides various functionalities including a newsletter, job board, a video platform (Tech TV), and an agenda for events and conferences. The site focuses on strategic themes such as high-performance organizations, risk management around AI, and the impact of government initiatives like the IT-Deltaplan. | Robotics & Automation → Industry 4.0 74 | cybersecurity 688 digitalization 757 ai 2181 article 6000 news 15293 | |
| newmorn.nl | Newmorn’” | Newmorn’ supports organizations in combating cyber security and privacy risks. The website details various services, including audits (internal, assurance, DigiD, VIPP, TPM, AVG/GDPR), consultancy (implementation management system, Microsoft Teams as ISMS, Google Workspace as ISMS, Governance Risk & Compliance (GRC), Cyber Security Policy, Risk Analysis, Business Continuity), standards (ISO 9001, ISO 27001, ISO 20000, NEN 7510) and coaching. Newmorn’ offers specific audit services and guidance for certification and compliance, focusing on translating requirements into practical applications. | Legal → Privacy 596 | management system 118 compliance 506 audit 622 cybersecurity 688 privacy 1286 certification 3380 | |
| nbip.nl | NBIP | NBIP helps providers of digital infrastructure meet legal obligations and operational risks through joint cybersecurity services, knowledge sharing, and collaboration with partners. NaWas has been the collective DDoS protection service for digital infrastructure providers for over 10 years, used by nearly 200 hosting and cloud providers in 10 European countries. The NBIP Tap Service takes care of the operational tasks associated with the tapping obligation under the Telecommunications Act for over 100 parties. Additionally, NBIP, through Clean Networks, provides support in combating online abuse. | Radio & Communication → Telecommunications 1361 | risk management 543 cybersecurity 688 provider 1111 partner 4272 | |
| weerbaarbestuur.nl | Network Weerbaar Bestuur | The Network Weerbaar Bestuur offers support in ensuring the safety of political officials, including providing safety scans and addressing intimidation and conflicts of interest. Stakeholders can share their experiences, and the Network provides various guidelines, such as an integrity assessment for candidates and a support package against online aggression and intimidation. The Network has worked on the North Holland Weerbare Government Norm and supports municipal secretaries with resilience packages. | Municipalities → Governance 1043 | undermining 18 official 48 integrity 205 governance 610 safety 5819 | |
| nemcon.nl | nemcon.nl | The website provides a curated list of recent cybersecurity news articles from sources such as Security Week, Bleeping Computer, TechCrunch, and Dark Reading. It includes information on vulnerabilities, including specific CVEs (Common Vulnerabilities and Exposures) like CVE-2025-53771 related to Microsoft SharePoint Server. The site also lists alerts from organizations like NCSC, US-Cert, and Microsoft, offering users a centralized location for tracking security updates and threats. | Technology & Digital → Technology News 31 | threat 62 vulnerability 149 alerts 151 cybersecurity 688 news 15293 | |
| jegezichtisnuvanons.nl | POM.press | The book is written by Kashmir Hill, a tech reporter for The New York Times, and investigates how a startup has collected billions of photos, possibly including those of the reader, over many years. The authors, Alexander Klöpping and Ernst-Jan Pfauth, publish this work in collaboration with the publisher POM.press, to highlight the risks of facial recognition. The book has received positive reviews from journalists and a privacy expert, who consider it an important warning and describe it as a thrilling read. | Literature → Non-Fiction 519 | startup 376 privacy 1286 technology 6816 photo 7778 book 11396 | |
| codebrain.nl | CodeBrain BV | The company describes itself as 'software developers who love coding' and emphasizes solving complex problems and creating good products. CodeBrain offers ready-made plugins for payment and postcode data, as well as custom code development. The website states that CodeBrain has experience developing APIs, SDKs, SaaS integrations, plugins, and platforms, including iDEAL Checkout and Postcode Checkout. | E-Commerce → Webshop Software 69 | sdk 10 plugins 123 postcode 221 api 276 code 509 payment 1389 | Drenthe → Meppel 1903 |
| hart4technology.nl | Hart 4 Technology | The website focuses on protecting data through secure working practices, comprehensive network security, and high-quality storage media. It offers a wide range of products including encrypted USB sticks, hard drives, Faraday bags, and various security solutions like FIDO2 authentication and ZoneZero security technologies. The site provides resources such as a knowledge base, blog, and shopping cart for customers to explore and purchase data security products and services. | | data security 20 network security 22 hard drives 24 authentication 48 | |
| dataexpert.nl | DataExpert NL | DataExpert helps organizations make the world safer by offering expertise, innovative software, training, investigations, support, and consultancy services. The website offers a wide range of products including forensic hardware, cloud forensics, mobile forensics, and software from vendors like Amped, Cellebrite, and Exterro. DataExpert provides various training and workshops, including Digital Forensics, Cyber Security, OSINT (Open Source Intelligence) and Cryptocurrency training. | | crypto 384 investigation 400 cybersecurity 688 software 8291 training 28133 | |
| 7tuineninhetgooi.nl | Various News Organizations | Several articles report on rehabilitation efforts for individuals with brain conditions, including patient testimonials and calls for increased investment in rehabilitation services. News coverage includes cybersecurity breaches targeting US agencies, highlighting vulnerabilities in software like Microsoft Sharepoint and the subsequent exploitation by hackers. The website features reports on wildfires in France and the Philippines, detailing containment efforts and casualties, as well as discussions about improving public transportation in the Grand Genève region. | Technical → Security 408 | space exploration 12 legal proceedings 31 cybersecurity 688 rehabilitation 1512 transportation 2851 | |
| daemen-ict.nl | Daemen ICT | Daemen ICT has over 30 years of experience and is ready to provide award-winning service, and is rated an average of 9.4 / 10. The company offers a wide range of services including cybersecurity, online workplaces, IT management, VOIP online telephony, security scans, and online training. Daemen ICT develops and implements smart and secure IT solutions that help businesses work more efficiently, with a personal approach and custom solutions, with over 300 satisfied customers and more than 1,239 online workplaces realized. | | cloud 1527 it 1539 internet 1678 security 6655 training 28133 | North-Brabant → Bergen op Zoom 2274 |
| scyon.nl | Scyon | Scyon is driven by a passion for cybersecurity, combining software craftsmanship with expertise in the field. The company focuses on identifying and resolving cybersecurity vulnerabilities that arise during software development, thereby improving the security of organizations and their products. Scyon supports organizations by collaborating with development teams, training employees, and delivering secure code, often during the design phase, to implement a shift-left approach. | Programming → Software Development 45 | code 509 cybersecurity 688 software 8291 | |
| cvdnederland.nl | Center for Safety and Digitalization | The center focuses on the challenges arising from the rapid digitalization of society, such as cyberattacks and data breaches. A PhD candidate, Elif Ozer, emphasizes the need for resilience within organizations as a basis for effective cybersecurity and the creation of a corporate culture that integrates cybersecurity. The center organized a workshop on Whole of Society in the Triangle area on June 6, 2025, with the aim of promoting a more resilient society. | Government & Administration → Administrative Organizations 31 | digitalization 757 resilience 1091 safety 5819 research 8967 collaboration 16036 | Gelderland → Apeldoorn 6996 |
| babid-management.nl | BABid Management | BABid Management is owned by Bas de Bruin, who has extensive experience leading IT teams and projects. The company’s services include assisting clients in winning government tenders through effective bid team leadership, utilizing the monday.com platform for collaboration. Bas de Bruin also founded Excellent Team, which develops and supports custom apps for the monday.com platform. | Engineering → Engineering Firms 989 | bid 230 tender 329 teamwork 497 app 4595 | |
| realnetwork.nl | RealNetwork.nl | The website offers an overview of various IT services, including IT management, IT security, IT optimization, and IT infrastructure, with specific solutions for law firms, financial institutions, and healthcare organizations. RealNetwork.nl emphasizes its specialization in IT security and privacy, offering a 'full service' approach where they are responsible for managing all aspects of a client's IT environment. The service focuses on preventing issues and providing continuous security and support, with a no-nonsense mentality and per-user-per-month payment, aimed at relieving clients and focusing on growth and innovation. | | privacy 1286 infrastructure 1460 security 6655 | |
| beveiligingswereld.nl | BeveiligingsWereld | A large portion of Dutch organizations (90%) is not adequately prepared for the increasing cyber threats amplified by artificial intelligence, according to a recent report by Accenture. Cyberattacks are increasing annually, and misconceptions persist within the security industry, particularly with the rise of fake videos and deepfakes. Research shows that organizations fall short in supporting the resilience of their IT and security employees, posing a significant risk to business continuity. | Business & Industry → Business News 468 | cyber threats 15 cyberattacks 17 resilience 1091 collaboration 16036 | |
| jewelnotebooks.nl | Cybersecurity Tips en Advies | The website contains blog articles covering topics such as online visibility, the best laptops and gaming PCs, professional website builders, and 3D printers. It discusses the value of printing in the current digital world and the need for efficient management and the right software for organizations. The website focuses on offering solutions and advice in the areas of cybersecurity, ICT, website development, and software management. | Technology → ICT 486 | 3d printer 104 cybersecurity 688 laptop 1320 print 5511 software 8291 | |
| access42.nl | Access42 | Access42 offers a range of services, including offensive and defensive security, managed security services, and a Security Operations Center (SOC). The company specializes in identifying and neutralizing threats through proactive measures, such as penetration testing and simulated attacks. Access42 works with organizations to set up a solid security infrastructure, continuously monitor it, and maintain a safe digital environment. | Information Technology → IT Security 980 | penetration testing 43 cybersecurity 688 monitor 1063 security 6655 | |
| zondervirus.nl | Zendervirus | The website covers topics such as the safest browsers, browser vulnerabilities, and an analysis of ransomware attacks and ransomware software. There is reporting on increasing cyberattacks in 2021 and 2022, including the impact of digital Covid-19 passports and the risks of data protection. The site also offers news about anti-malware and anti-spyware software, and data backup and recovery strategies are discussed. | | ransomware 41 browser 139 virus 195 security 6655 software 8291 | |
| vest.nl | Vest | Vest was founded 22 years ago and specializes in cybersecurity, with the goal of supporting organizations in protecting against digital threats. The service offerings are divided into four pillars: Security Awareness, Security Design, Security Management and Security Testing, encompassing all aspects of cybersecurity. Vest combines networks, applications, systems and legal regulations to create a solid foundation for cybersecurity and integrates it fully into business operations. | Insurance & Risk → Risk Management 1060 | pillar 80 incident 335 cybersecurity 688 security 6655 network 11123 | |
| ccinfo.nl | ccinfo.nl | The website publishes news on the latest trends in cybercrime, cyberattacks, and darkweb activities. Users can learn how to protect themselves from digital threats. Cybercrimeinfo.nl also offers a newsletter and a podcast. | Information Technology → IT Security 980 | cyberattacks 17 cybersecurity 688 podcast 3328 news 15293 | |
| csirtdsp.nl | Ministry of Economic Affairs and Climate | The website serves as an access point for reporting incidents that fall under the WBNI (Digital Security Act) or making voluntary reports. The CSIRT-DSP is integrated with the NCSC and will cease active operation as of January 1, 2025. The website is no longer maintained. Through the online reporting form, digital service providers can report incidents to both the NCSC and the Digital Infrastructure Inspectorate, with the option to report to the NCSC only. | Government & Administration → Ministries 142 | incident 335 | |
| creds.nl | CREDS | The CREDS ART platform supports various use cases including advisory services, red teaming, web application testing, infrastructure testing, phishing simulations, and cloud security assessments. The platform’s benefits include real-time attacks, continuous availability, control over resilience, and cost reduction by eliminating the need for agents or installation. Current penetration testing methods often lack depth, accuracy, and real-time insights, prompting CREDS to offer a dynamic and proactive approach through automated attacks. | | attack 31 vulnerability 149 insight 628 assessment 1205 | |
| bastijn.nl | Philips Healthcare | Bastijn Vissers is a Senior Architect at Philips Healthcare, specializing in designing and implementing scalable system architectures for imaging platforms across various modalities including MR, CT, and US. His role involves providing technical leadership to development teams, managing stakeholders, and driving innovation within the Philips HealthSuite Platform – Clinical Platforms, overseeing 12 scrum teams. Vissers' profile highlights his strong problem-solving skills, leadership qualities, and continuous learning mindset, combined with a desire to improve and achieve results. | | stakeholder 431 architecture 3223 leadership 3724 innovation 4659 software 8291 | North-Brabant → Eindhoven 11845 |
| whitehats.nl | WhiteHats | WhiteHats is a cybersecurity specialist offering a wide range of services including security research, security advice, and workshops. The organization focuses on identifying vulnerabilities in web applications, business networks, and systems through manual analyses and periodic vulnerability scans. WhiteHats’ approach is based on the OWASP Top 10 reference framework, a globally recognized standard for web application security. | Software & Computing → Computing 696 | attacks 12 application 3377 security 6655 research 8967 network 11123 | |
| opensecure.nl | OpenSECURE | Eelke Smit offers security and automation expertise, specifically focused on secure application delivery, Next-Gen Firewalls, DNS security, email security, and AWS. The website describes Smit’s expertise in various security technologies, including Palo Alto Networks, F5 Networks, Infoblox, and Ansible. OpenSECURE offers security design & advisory services, implementations of security solutions, and automation of security systems, both on-premise and in the cloud. | Freelance & Independent → Freelance Services 366 | firewall 51 dns 74 cloud 1527 automation 2682 application 3377 security 6655 | |
| cci-research.nl | Complex Cyber-Infrastructures (CCI) Group | The CCI group, part of the Informatics Institute, focuses on technologies like cloud computing, edge computing, blockchain, and data spaces. Their research addresses key concerns such as compliance with policies, security, privacy, and environmental sustainability, supporting applications like data analytics and artificial intelligence. Recent news highlights include publications, presentations at conferences (SPLASH 2024, Supercomputing 2024), and the kick-off of a European Union funded project (LICORICE). | Computer Science → Software Engineering 404 | policy 2149 research 8967 | North-Holland → Amsterdam 41253 |
| critis2013.nl | CRITIS | The conference, held in Amsterdam, Netherlands, from September 16-18, 2013, aims to present innovative research and explore challenges in protecting critical information-based infrastructures. Specifically, the conference will address the resilience of smart cities, drawing on lessons learned from the Netherlands' critical infrastructure protection program since 2003. The conference's agenda includes dialogue between stakeholders from government, industry, and research, as well as academic presentations and initiatives to foster young researchers in the field of CIP/CIIP. | Technical → Security 408 | smart city 27 stakeholder 431 conference 763 infrastructure 1460 security 6655 research 8967 | North-Holland → Amsterdam 41253 |
| pinewood.nl | Pinewood | Pinewood has been a cybersecurity specialist in the Netherlands for 28 years and offers services such as prediction, pentesting, vulnerability scanning, and incident response. The company integrates IT and OT security and works with partners like Fortinet, Checkpoint, and F5 Networks, and has a Security Operations Center (SOC) for detecting risks. Pinewood also offers consultancy, training, whitepapers, and blogs on cybersecurity, and monitors standards NEN7510 and ISO27001. | Information Technology → IT Security 980 | soc 10 cybersecurity 688 monitor 1063 consultancy 2596 risk 2896 | |
| thetrustedthirdparty.nl | TT3P | TT3P provides a range of services including free online cyber scans, pentests, darkweb scans, risk assessments and evaluations, supplier audits, phishing simulations, and organizational security audits. In addition to technical services, TT3P offers training, both on-site and online, and a cyber brainstorm session. The website also provides whitepapers and FAQs about cybersecurity. The website features testimonials from clients, such as the VPRO, and emphasizes the value of TT3P’s services, including the development of information security policies and employee training. | Insurance & Risk → Risk Management 1060 | audit 622 cybersecurity 688 scan 790 policy 2149 risk 2896 training 28133 | |
| viewonit.nl | View on IT | The company handles customers’ IT needs, including support, security, cloud services, and network management, and offers various IT packages and consulting services. View on IT focuses on providing a stable and secure working environment for its customers, with an emphasis on transparent subscriptions and rapid support. The website offers IT security checks and customer stories to illustrate the benefits of their services and highlights the risks of cybercrime for SMBs. | | cloud 1527 it 1539 subscription 3287 security 6655 | |
| sekurigo.nl | Sekurigo | Organizations face the challenge of continuously adapting to changing circumstances, such as remote work and the use of cloud solutions. Cyberattacks pose a significant risk and can lead to data breaches and reputational damage. Sekurigo provides solutions and advice to protect organizations’ business information and personal data and minimize the risk of incidents. | Insurance & Risk → Risk Management 1060 | business information 15 cyberattacks 17 it infrastructure 84 personal data 93 cloud solutions 281 | |
| pelican-ict.nl | Pelican ICT | Pelican ICT has over 25 years of experience as an IT service provider in the Netherlands and specializes in cloud computing and cybersecurity. The company offers a variety of services, including cloud computing (migration, management, and security), cybersecurity (security advice and firewall security), and network management. Pelican ICT is known for its technical expertise and customer service and provides customized solutions for specific clients. | IT → Network Management 702 | cloud computing 84 network management 235 cybersecurity 688 | |
| giovane-moura.nl | TU Delft Cyber Security group | Giovane C. M. Moura is a Data Scientist at SIDN Labs, the top-level domain operator for the .nl domain in the Netherlands. He also holds an Assistant Professor position at TU Delft’s CyberSecurity group. His research primarily focuses on applying academic rigor to improve the performance, security, and stability of networked systems. The website showcases recent publications related to phishing attacks, NTP pool analysis, vulnerability disclosure, and DNS response manipulation. | Research → Scientific Research 243 | data science 193 cybersecurity 688 publication 2018 research 8967 | |
| wpmeetupamsterdam.nl | WP Meetup Amsterdam | The website promotes a regular series of WordPress Meetups held in Amsterdam, focusing on learning, networking, and knowledge sharing. Upcoming events are listed, including a talk on ‘Grid-aware Websites’ scheduled for September 16, 2025, presented by Fershad Irani of the Green Web Foundation. The site provides information about past meetups, the Meetup’s schedule, location (Stayokay Hostel Amsterdam Oost Timorplein 21), and a code of conduct to ensure a welcoming environment for attendees. | Community & Social → Social Events 416 | code of conduct 40 meetup 67 networking 842 presentation 1785 wordpress 3551 event 45199 | North-Holland → Amsterdam 41253 |
| red9.nl | Red9 | An article details how to silence the APC UPS alarm sound on a Synology NAS due to a failed battery, explaining the solution from within the DSM 7.x environment. A post describes troubleshooting and resolving an 'interface configured but down' issue when deploying a Palo Alto VM on VMware ESXi, suggesting a DPDK configuration change. A guide provides a solution to an SCP error encountered when transferring files to a Cisco ASA appliance. | Computer Science → Networking 809 | | Leidsche Rijn → Leidsche Rijn-South 29 |
| tide-project.nl | TIDE Project | The project investigates DNS-based reflection and amplification DDoS attacks, examining how domain names contribute to these attacks. Recent blog posts cover topics such as measuring amplification potential, detecting IDN homograph domains, and evaluating the effectiveness of limiting responses to ‘ANY’ queries. Researchers are creating estimations of the amplification potential for hundreds of millions of domain names and comparing them to observed attack data. | Computer Science → Networking 809 | attack 31 dns 74 measurement 731 domain 1811 | |
| catrin.nl | Silkior | The website outlines the principles of a Responsible Internet, including controllability (user control over data handling), accountability (explicit description of decision-making norms), and transparency (describing the internal structure of the network). CATRIN assists service providers by fostering trust and digital sovereignty, and provides users with an Internet that is controllable, accountable, and transparent. The site offers various resources such as papers, talks, and general publications related to cybersecurity, digital sovereignty, and the Responsible Internet. | Business → Economy 36666 | accountability 63 transparency 442 cybersecurity 688 trust 1147 internet 1678 | |
| evant.nl | Evant | The website provides information about EVANT’s services, including fast, high-value, and low-overhead market entry and growth strategies for cyber security technology start-ups. EVANT emphasizes its extensive experience and business knowledge specifically within Cyber Security solutions. The site includes sections detailing who EVANT helps, the technologies they work with, and customer testimonials. | Law → IT Law 17 | startup 376 cybersecurity 688 growth 4054 | |
| dairiten.nl | Dairiten | Dairiten provides advice and support, particularly in the areas of biometric access control, energy transition projects, and the management of affiliate networks. The company is the RVA (Relatieverantwoordelijke Vertegenwoordiger) of GlobalSign in the Netherlands and supports start-ups and young businesses. Dairiten is also specialized in project and program management, and has a focus on secure communication via a screen, through the ItsSafe platform. | Online Marketing → Affiliate Marketing 299 | affiliate 84 security 6655 network 11123 | |
| cypherpunk.nl | SURF | Joeri de Ruiter's professional background includes roles as a technical specialist in security and privacy at SURF, a research engineer at SIDN Labs, and an assistant professor at Radboud University Nijmegen, where he conducted research on internet security protocols. He has also held a Research Fellow position at the University of Birmingham, focusing on the SCEPTICS project, which evaluated threats to industrial control systems. His published works cover topics such as private user discovery, next-generation internet architectures, and distributed secure mapping of network addresses, as evidenced by several conference proceedings and journal articles. | Information Technology → IT Security 980 | protocol 237 privacy 1286 internet 1678 publication 2018 security 6655 research 8967 | |
| veiligheid-en-de-wiv.nl | Unknown (Cybersecurity Researchers, Computer Scientists, Security Professionals) | Proponents of the Wiv claim that a no vote will lead to an insecure society, but cybersecurity researchers and security professionals question this assertion. A key security risk is the extensive hacking authority granted to the services, allowing vulnerabilities to be concealed from relevant parties, putting the target and citizens at risk. The cyberattack on the Rotterdam port demonstrates that failing to report vulnerabilities can cause serious economic damage and that the use of vulnerabilities by the government can create new vulnerabilities, as seen in Germany with the Bundestrojaner. | Government & Administration → Legislation 432 | cyberattack 21 intelligence 81 vulnerability 149 privacy 1286 security 6655 | |
| spl.nl | SPL | SPL implements and manages various security measures and products, including risk assessment, network visibility and control, and phishing simulations. The company offers consultancy, advice and implementation services, as well as various managed services such as Network as a Service, Managed Firewall, Managed SD-WAN and Managed Modern Workplace. SPL has a team of experts and is rated with a 9.0, offering rapid support (within 1 hour) and a customer-focused approach. | IT Security → Business Security 18 | risk 2896 partner 4272 security 6655 network 11123 | |
| roselabs.nl | Rotterdam Security Labs | The website emphasizes the growing importance of security in an increasingly interconnected world, particularly regarding devices like connected cars and pacemakers. The lab’s minor program teaches students how to evaluate the security of connected devices, fostering a 'security mindset' – the ability to identify vulnerabilities and exploitation methods. Students are challenged to become security analysts by applying a holistic approach to security evaluation, examining targets from multiple perspectives. | Science → Computer Science 2413 | evaluation 224 mindset 782 security 6655 student 7623 | |
| afkowobo.nl | Techaro | Anubis utilizes a Proof-of-Work scheme, similar to Hashcash, to deter large-scale scraping activities, which can disrupt website availability. The primary goal of Anubis is to identify and block headless browsers and AI companies engaged in aggressive scraping, rather than directly presenting the challenge to legitimate users. Due to the JavaScript-dependent nature of Anubis, users are required to enable JavaScript or disable plugins like JShelter to access the website; it is protected by Anubis from Techaro. | Web Design & Development → Web Technologies 34 | browser 139 plugin 203 javascript 238 challenge 1697 | |
| connect2trust.nl | Connect2Trust Foundation | Connect2Trust facilitates a collaborative environment for organizations, including companies and government bodies, to share information and best practices regarding cyber threats. The Foundation focuses on analyzing sensitive data related to cyber security and promoting responsible disclosure of vulnerabilities. Key activities include organizing events like CyberSQUAD meetings and developing projects such as ThreatMatcher and Connect2Tables to strengthen cyber defense capabilities. | Relationships → Partnerships 481 | cybersecurity 688 partnership 1407 | South-Holland → The Hague 19898 |
| securesult.nl | Securesult | Securesult provides high-quality information security advice and services to organizations of all sizes, focused on protecting against cyberattacks and promoting a culture of security awareness. Services include CISO as a Service, penetration testing, ISMS implementation, assessments, a human factor program, and interim security staff. The organization works with clients in the financial sector, education, public sector, and healthcare sector to secure their digital environment and strengthen their defenses. | Insurance & Risk → Risk Management 1060 | attack 31 information security 217 cybersecurity 688 risk 2896 | |
| werkenbijfortezza.nl | Fortezza | The website publishes an overview of available job vacancies at Fortezza, targeting professionals with expertise in data, IT, cybersecurity, consulting, and software development. Fortezza describes its mission as making people successful in the digital transformation, and emphasizes a culture of energy, openness, and conviviality, where growth and collaboration are central. The company offers a professional work environment with challenging assignments, personal growth, and responsibility, with a focus on the success of employees. | IT → Managed Services 720 | software development 358 cybersecurity 688 it 1539 consulting 3639 data 5872 | |
| voorkomfraude.nl | N.V. | The website includes an overview of common fraud forms, such as purchase fraud, bank helpdesk fraud, and CEO fraud. Educational videos and podcasts are available with information about various forms of fraud, including cryptocurrency fraud and dating fraud. The website offers a test to assess whether users can recognize and prevent fraud, and a section with frequently asked questions about fraud. | Security → Online Security 45 | fraud 200 test 769 question 2261 podcast 3328 video 6714 | |
| dcsp.nl | DCSP | The website features a collection of articles and interviews discussing various aspects of data security, including developments in privacy law, AI regulation, and cyberwarfare. Specifically, the website presents analyses concerning the evolving role of privacy professionals, the use of legitimate interests in AI training, and the implications of recent court rulings. Furthermore, DCSP Magazine publishes content on topics such as digital transformation, cloud adoption, and the significance of legal definitions within cybersecurity, alongside discussions on the impact of NIS2 regulations. | Legal → Legal Issues 56 | cybersecurity 688 privacy 1286 interview 1371 ai 2181 data 5872 article 6000 | |
| tradewithnl.nl | Dutch Government & Private Sector | The website highlights various international coalitions and partnerships, including the Coalition for Defense & Security in several countries (Greece, Malaysia, South Korea) and the NL Ecoparks initiative connecting the Netherlands and Indonesia. It focuses on cybersecurity efforts across Europe and the United States, featuring joint ventures between Dutch companies and knowledge institutes to enhance digital security. Furthermore, the site emphasizes sustainability initiatives, such as climate-neutral real estate projects, waste management programs, and water technology developments, all supported by collaborative endeavors across different regions. | Supply Chain & Logistics → International Trade 1156 | trade 553 cybersecurity 688 netherlands 1376 collaboration 16036 sustainability 18451 | |
| veiligheidscoalitiedenhaag.nl | Veiligheidscoalitie Den Haag | The website offers a knowledge base with news, webinars, articles and annual reports on topics such as undermining crime, human trafficking and cybercrime. Tools are available, such as a toolbox for municipal council members and a signal card for professionals to recognize signs of undermining. The Veiligheidscoalitie organizes meetings and newsletters to share relevant information and promote collaboration. | Security → Crime Fighting 13 | toolbox 124 crime 148 knowledge base 569 safety 5819 news 15293 event 45199 | South-Holland → The Hague 19898 |
| arjenwiersma.nl | Scyon | Arjen Wiersma is a Cyber Security Consultant at Scyon, providing expertise in Application Security, Offensive Security, and (Cyber) Business needs. Throughout his nearly 30-year career in the software and security industry, he has held various roles, including managing teams and technologies across diverse sectors such as internet providers, startups, healthcare, and education. Wiersma's experience encompasses Java, dotNet, Serverless, Javascript, and he is an active member of several professional organizations, including NLJUG, VERSEN, and OWASP. | Enterprise Solutions → Enterprise Software 103 | java 176 cybersecurity 688 consultant 706 security 6655 | |
| securitymeldpunt.nl | The Netherlands Security Reporting Point | The Reporting Point facilitates the exchange of this information with trusted parties to enhance the cybersecurity resilience of organizations. Originally, the goal was to address a deficiency in the National Covering System, ensuring that all potential victims or targets of a cyberattack could be adequately informed. Currently, due to the takeover of the execution of victim and target notification by the NCSC, the organization's operational activities have been suspended, although it continues to monitor and oversee the progress. | Community → Government & Administration 10567 | target 77 vulnerability 149 notification 183 cybersecurity 688 | |
| aazoo.nl | aaZoo | The company offers a wide range of solutions, including zero-trust security, next-generation firewalling and endpoint detection & response, to protect organizations from external risks. aaZoo focuses on various sectors, such as healthcare, industry, education, business services, and government, providing solutions for enterprise network switching, wireless networking, and intelligent SD-WAN. The website provides information about vacancies, a knowledge base, and news on the latest developments in network and cybersecurity. | IT → Network Management 702 | center 1115 knowledge 3528 data 5872 security 6655 network 11123 | |
| hashcheckservice.nl | Offlimits | The service allows users to scan their data for CSAM, leading to faster detection and removal of illegal content. It addresses the ongoing challenge of online sexual abuse of minors, where illegally shared content can persist and re-victimise victims. Organizations can leverage the Hash Check Service to contribute to safeguarding the internet. | Social Issues & Welfare → Child Protection 99 | data 5872 | |
| mkbcybertalk.nl | MKB CyberTalk | The podcast is presented in collaboration with the MKB and covers practical solutions for cybercrime, without technical complexity or expensive investments. Xander Koppelmans, an experienced cybersecurity professional who was himself hacked, openly discusses the consequences to break the taboo around cybercrime and invites other entrepreneurs to share their stories. The podcast covers all aspects of cybersecurity, from threats to preventative measures, behavioral measures, and news updates. Audio versions of the podcasts are available on various streaming platforms. | Financial Management → SME 161 | threat 62 backups 83 cybercrime 87 podcast 3328 story 8285 | |
| thesslstore.nl | The SSL Store™ | The website provides various SSL certificate options, including DigiCert, Symantec, Thawte, and Comodo certificates, along with code signing, email signing, and mark certificates. It also offers website security solutions such as cWatch, HackerGuardian PCI Scan, and TrustedSite, designed to enhance online security and facilitate PCI compliance. In addition to certificate sales and management tools, The SSL Store™ features a blog, knowledgebase, and management portal for certificate lifecycle management, including private CA solutions and IoT certificate management. | Web Hosting → Hosting Providers 1075 | website security 43 ssl certificate 89 | |
| eindhovensecurityhub.nl | Eindhoven Security Hub | ESH operates a Security Operations Center (SOC) offering tailored security services to its partners' clients. The hub leverages cutting-edge research and development, technological innovation, and practical industry experience to provide robust security solutions. ESH’s services focus on safeguarding data and networks, incorporating threat intelligence, monitoring, and incident response capabilities. | Information Technology → IT Security 980 | soc 10 r&d 56 cybersecurity 688 monitor 1063 technology 6816 | |
| veiligheidsalliantie.nl | VeiligheidsAlliantie Rotterdam | The alliance comprises 23 municipalities, the police, and the Public Prosecution Service within the Rotterdam Police Unit. The website provides the latest news on topics such as cybercrime and human trafficking. There is an agenda with webinars and events related to digital security and cybercrime. | Law → Human Rights 510 | human trafficking 30 cybercrime 87 webinar 870 agenda 4374 account 5781 security 6655 | South-Holland → Rotterdam 25048 |
| ocs-consulting.nl | OCS Consulting | The company was established in 1984 and operates with offices in the Netherlands, UK, Switzerland, and Belgium. Their services include consulting, project management, managed services, bespoke development, flexible resourcing, and support for various technologies like SAS, Java EE, Microsoft, and Oracle. OCS Consulting serves both large corporations and small to medium-sized businesses (SMBs) and has a client list that includes prominent companies like Unilever and numerous UN Agencies. | Information Technology → Data Management 827 | managed services 95 resources 310 consulting 3639 | |
| janusid.nl | JanusID B.V. | The website offers various services, including CheckedID and ShowID, which verify the identity of professionals and ensure the security of personal data. JanusID focuses on ‘Know Your Customer’ (KYC) and ‘Know Your Employee’ (KYE) solutions, to ensure that companies know with whom they do business and who they hire. The website emphasizes the importance of securely and reliably verifying identities, offering an alternative to the current process of processing copies of passports and identification cards, in accordance with the Wwft. | Financial Services → Compliance 399 | kyc 15 verification 40 identity 1028 data 5872 | |
| cisoday.nl | CISODAY | The event focuses on sharing ideas, use cases, and best practices in a relaxed and upscale environment. A key highlight of the event is the presentation of the CISO of the Year award, recognizing outstanding contributions in the cybersecurity field. The 2025 event will be held at the NBC Congrescentrum Nieuwegein in the Netherlands on May 27th, 2025, and will feature over 300 cybersecurity leaders, along with speakers and networking opportunities. | Information Technology → IT Security 980 | cybersecurity 688 networking 842 speaker 1481 partner 4272 event 45199 | |
| it2grow.nl | it2grow | it2grow supports organizations with Veeam expertise and managed security services, based on solutions from leading cybersecurity vendors. The website provides services such as cyber attack recovery, staffing, managed threat hunting, managed compliance, and managed backup, aimed at data resilience and infrastructure security. it2grow has experience with various integrations, such as SOPHOS and Veeam, and offers consultancy, alongside webinars and events on cybersecurity vision. | IT → Managed Services 720 | managed services 95 compliance 506 cybersecurity 688 integration 1451 data 5872 | Berg en Dal → Groesbeek 653 |
| zeker-online.nl | Zeker-OnLine | The website describes the EU Cybersecurity Act and the associated certification scheme (EUCS) for cloud services, which lays the foundation for European certifications. The EUCS is in the final phase of development, and the first draft was published by ENISA in December 2020. The scheme includes a general regulatory framework, an IT norm framework, and a conformity assessment method. Zeker-OnLine has played an important role in the development of the conformity assessment method for the EUCS, in collaboration with the Rijksinspectie Digitale infrastructuur and the Ministry of Economic Affairs and Climate. | Business → Economy 36666 | cloud services 198 cybersecurity 688 certification 3380 | |
| vgb.nl | VGB | The website provides information on various themes relevant to the sector, including sustainability, labor, public affairs, market access, standardization, and data. An agenda with current events and news is available, along with information about the VGB's members and sector statistics. The website covers specific regulations and standards, such as CSRD, PPWR, and Floricode, and offers links and helpful information regarding, for instance, NVWA rates and import-export rules. | Government & Administration → Legislation 432 | lobby 81 export 630 regulation 1350 data 5872 member 10154 sustainability 18451 | |
| urlinformatie.nl | URL Information | The company strives to deliver innovative and customized solutions for branding, marketing strategies, and product development, to help companies succeed in the competitive market. The website offers a wide range of services, including business analysis, cloud computing, SEO optimization, reporting analysis, enhanced security, and project reporting. The blog contains recent articles on various business-related topics, such as the effective use of office supplies and tracking during delivery. | | growth 4054 security 6655 marketing 7107 | |
| nerium.nl | Nerium | The company offers various services including Incident Response, Managed Defence, cybersecurity advice, and detecting attackers using honeytokens. Nerium monitors and responds 24/7 to digital attacks, monitoring Microsoft/Azure and Amazon Web Services environments and providing expert assistance. The website also offers job vacancies, blogs, and a 24/7 incident hotline, emphasizing the company’s proactive detection and response capabilities. | Information Technology → IT Security 980 | incident response 15 cybersecurity 688 environment 4873 | |
| eshatrojan.nl | E.S.H.A. Trojan | The event, taking place on May 17th, offers a range of cybersecurity challenges suitable for all skill levels, from beginners to experienced hackers. Participants will have the opportunity to compete for prizes and enjoy free lunch and dinner provided by Appèl. The organization aims to foster a community of hackers by providing training and opportunities to participate in CTFs, making them accessible to individuals from diverse backgrounds. | | ctf 10 challenge 1697 community 7931 training 28133 | Eindhoven → Center 108 |
| optisec.nl | OptiSec | The website provides various certified training programs, such as Certified Ethical Hacker, Certified SOC Analyst, and Certified Information Systems Security Professional (CISSP), as well as training courses focused on Azure Security, Microsoft 365, and AI. OptiSec offers training and tools around pentesting, container security, and incident response, including Kali Linux for hackers and OptiSec Container Security. The website promotes a personal and effective approach to training, with small classes, personalized attention, and a focus on achieving rapid certifications, as well as affordable prices and guarantees. | Business & Management → Certification 364 | rating 217 certification 3380 student 7623 price 8328 training 28133 | |
| phishingtest.nl | Phishingtest.nl | In November 2019, Phishingtest.nl, in collaboration with AVROTROS Opgelicht?!, conducted a test where all 160 members of parliament received a (fake) phishing email. A phishing test simulates a hacker attack, where employees are lured through a fictitious email to click on links and provide information. The test analyzes how well the organization is able to recognize and prevent phishing attempts, with the aim of increasing awareness and preventing data breaches. | Information Technology → IT Security 980 | phishing 34 email 1012 data 5872 | |
| mkbcybertraining.nl | MKB Cybertraining B.V. | The website focuses on raising awareness of cyber risks for SMEs and the consequences of a successful cyberattack. The training is specifically tailored to the needs of small businesses and provides solutions for preventing cybercrime. The website offers a basic course for just €12.50 per participant per year. | Insurance & Risk → Risk Management 1060 | antivirus 74 cybercrime 87 cybersecurity 688 risk 2896 | |
| novumpr.nl | NovumPR | The website features press releases covering a range of topics, including sports (Skechers and New York Knicks), cybersecurity research (Carnegie Mellon), retail (Multiply Group and Tendam), data storage (ExaGrid), pharmaceuticals (LEO Pharma), digital assets (MultiBank.io and Fireblocks), and fragrance technology (IFF). Recent press releases include confirmations of athlete rosters, announcements of cybersecurity advancements, retail acquisitions and expansions, positive financial performance of data storage companies, FDA approvals for pharmaceutical treatments, and collaborations involving digital asset platforms. The website also highlights industry events such as the Forrester Technology & Innovation Summit EMEA 2025, showcasing a variety of technologies and innovations. | Painting → Digital Art 820 | data storage 15 pharmaceutical 88 press release 143 retail 586 cybersecurity 688 | |
| datalekt.nl | DataLekt | The website documents cyber incidents that have appeared in the media since 2016, including ransomware, DDoS attacks, and data breaches. Information is based on publicly accessible news sources and transparency reports from organizations that voluntarily disclose incidents. The platform offers an interactive map with incidents per region and displays the number of fines and estimated damage caused by data breaches. | Government & Administration → Legislation 432 | data breach 16 fines 16 ransomware 41 incident 335 damage 1562 | |
| vulnerabilityscans.nl | Xolphin | The website offers SSL certificates and digital signatures, emphasizing the security of online communication. Xolphin is unique in Europe as a Registration Authority for Sectigo, enabling quick certificate delivery. Founded in 2002, the company has over 50,000 clients and has issued over 1,000,000 certificates and is ISO 27001 certified. | Technical → Security 408 | digital signature 10 ssl certificate 89 certificate 1036 security 6655 | |
| axle-it.nl | Axle-IT | Axle-IT offers robust solutions for secure and reliable IT environments, regardless of the location of employees. The website provides an overview of various solutions and services, such as management, monitoring, and security, emphasizing the need for an optimal and complete IT tooling. Axle-IT presents events and webinars, and offers IT advice tailored to the needs of businesses, focused on optimizing IT budgets and the security of corporate data. | | it management 150 monitor 1063 security 6655 event 45199 | |
| mite3.nl | MITE3 Cybersecurity | The company focuses on SMEs and larger organizations, offering clarity, direction, and a concrete plan for cybersecurity. MITE3 consists of three experienced experts with over 60 years of experience in IT and security, employing a pragmatic and independent approach. The company’s core values are honesty, taking responsibility, and leading by example, also investing in projects that promote transparency such as DataLekt.nl. | Information Technology → IT Security 980 | cybersecurity 688 plan 2566 | |
| mathijskadijk.nl | Q42 | Mathijs Kadijk is a mobile and web developer who is constantly seeking ways to improve his workflow and utilizes new libraries and tools. He particularly enjoys his time at Q42, citing autonomy, mastery, and a strong emphasis on teamwork and open discussion as key benefits. The company encourages collaborative problem-solving and client involvement in project decisions. Q42 fosters a culture of continuous learning and boasts a team of highly skilled and dedicated individuals, creating an environment of trust and shared ownership of projects. | Human Resources → Employee Engagement 133 | mastery 11 autonomy 155 developer 406 teamwork 497 | |
| acs.nl | ACS | ACS is divided into two entities: Coöperatie ACS Insight, which focuses on internal audits, cultural analysis, and communication, and ACS Assurance & Consultancy BV, which provides IT assurance, ISAE3402, ISO standards, and risk management. The coöperative is based on a network of independent professionals who collaborate and share knowledge to connect and improve organizations, often during periods of change. The website provides information on various services, including podcasts, report structures, training courses (MCA1 and MCA2) and newsletters, and offers insight into the background and expertise of the organization, including the transition of René Ewals to Forvis Mazars. | | assurance 24 audit 622 consultancy 2596 network 11123 training 28133 | |
| pvo-zeelandwestbrabant.nl | Platform Veilig Ondernemen Zeeland West-Brabant | The organization provides information, news, and an agenda with events related to safety for entrepreneurs in the Zeeland West-Brabant region. The website also offers links to external sources, such as Hackhelpdesk, which provides tips and assistance with cybercrime. PVO Zeeland West-Brabant works with regional partners to promote safe entrepreneurship and combat crime in the countryside. | Insurance & Risk → Risk Management 1060 | cybercrime 87 crime 148 partner 4272 agenda 4374 news 15293 | Moerdijk → Zevenbergschen Hoek 669 |
| reconfirm.nl | ReConfirm | ReConfirm protects company data and digital access by continuously monitoring and exposing security vulnerabilities. The platform provides a comprehensive overview of online security, identifying weaknesses and providing real-time insight into the status of the organization’s digital infrastructure. ReConfirm scans public assets, detects data breaches, flags configuration errors, and records access data, with the goal of simplifying, securing, and making digital security more affordable. | | threat 62 vulnerability 149 dashboard 1374 infrastructure 1460 security 6655 | |
| yippie-it.nl | Yippie IT & Security | The company offers services such as wireless internet, large cleaning (APK) for computers, installations, and troubleshooting internet and smartphone problems. The website informs about the end of Windows 8 and 8.1 management by Microsoft, leading to security risks. Yippie IT & Security offers solutions for these security problems and encourages visitors to contact them for support. | Computer → Computer Support 1003 | internet 1678 window 2030 problem 2214 security 6655 installation 13742 | |
| securitech.nl | Securitech Detection & Verification B.V. | The company was founded in 1993 and is an innovative enterprise specializing in document verification. The website offers various sections including an academy, products, industries, blogs, and information about the organization and contact details. Securitech Detection & Verification B.V. is a well-established name in the development, consulting, and sale of detection and verification equipment and products, offering solutions for various sectors such as police, border control, and notary offices. | Design & Creative → Specialized Services 238 | identity 1028 document 1678 software 8291 training 28133 | |
| hupra.nl | Hupra ICT | The company offers a wide range of services including cloud solutions, workplace management, IT security, and various Microsoft 365 products. In addition to technical services, Hupra offers support, consultancy, and security solutions, such as cybersecurity and risk assessments. The website contains information about customer reviews, job vacancies, reference customers, and various services such as cloud services and security solutions. | Cloud Computing → Microsoft 365 97 | microsoft 183 workplace 1046 cloud 1527 security 6655 | |
| anoigo.nl | Anoigo | Anoigo is a specialist in securely connecting applications with authentication resources such as DigiD, eHerkenning, and eIDAS. The company facilitates millions of identity verifications per year by connecting identities from central authorities and transporting these identities via secure protocols to applications. Anoigo offers solutions for various sectors, including government, healthcare, financial services, education, and insurance, and provides user stories demonstrating the value of their services. | | authentication 48 protocol 237 identity 1028 application 3377 security 6655 | |
| tektok.nl | Tek Tok | Tek Tok Late Night, a program from 2012 to 2016, addressed topics such as privacy, internet freedom, and digital security. In 2017, Tek Tok Late Night was discontinued and replaced with Hack Talk, a program with more freedom and volunteers. Hack Talk, accessible at www.hacktalk.nl, focuses on making complex issues within cybersecurity and technology enjoyable. | Entertainment → Radio 1338 | cybersecurity 688 privacy 1286 education 13471 | |
| jbtd.nl | JB Telecom & Data | The site offers a range of services, including Go-to-Market strategy development, market research, competitive intelligence, and post-merger integration consulting. JB Telecom & Data has published two series of business books related to Go-to-Market strategies, one tailored for scale-ups and the other for business students. The company specializes in supporting technology organizations with sustainable growth and offers additional short-term services such as portfolio revitalization and analyst relationship management. | Radio & Communication → Telecommunications 1361 | scale-ups 27 market research 163 cybersecurity 688 book 11396 | |
| fortytwo.nl | Fortytwo Security | The company offers a range of services including cyber security audits (PCI-DSS, 3DS & SWIFT), cloud management, payment security, and security assessments to evaluate a company's cybersecurity posture. Fortytwo Security simplifies complex audits like PCI and SWIFT compliance, providing expert guidance and ensuring minimal risk of data breaches or damage claims. They manage IT infrastructure and cloud environments, allowing businesses to focus on core business growth and innovation while ensuring security and efficiency. | Software & Computing → Cloud Computing 1253 | cloud management 16 audits 158 compliance 506 cybersecurity 688 assessment 1205 | |
| illegaaltje.nl | Illegaaltje.nl | The website offers tutorials and downloads for hacking WhatsApp accounts, claiming users can gain access within one minute without specialized skills. A 'Pokémon Go hack' is presented that provides unlimited coins, stardust, and candy's, along with a map showcasing locations of rare Pokemon. Furthermore, methods are described to hack Facebook, Skype, Hotmail, and Windows Live accounts, promising access to passwords, IP addresses, and other personal information. | | hack 36 tutorial 273 whatsapp 382 facebook 850 account 5781 | |
| cisocommunity.nl | ICT Media | The website hosts events, including a Digital Growth Summit, focusing on resilience, risk, and regulation for CISOs. It features research initiatives centered around Highly Resilient Organizations (HROs), examining preparation for emerging cybersecurity risks. The site also provides news and insights on cybersecurity topics, such as the impact of the Cybersecurity Act, AI application security, and the Dutch military’s digital transformation. | | act 425 cybersecurity 688 ai 2181 research 8967 event 45199 | North-Brabant → Eindhoven 11845 |
| fonboard.nl | Fonboard | The website covers topics such as internet providers, businesses, Wi-Fi routers, computer security, VoIP and browsers. It specifically focuses on supporting entrepreneurs by providing information on security, internet usage, and protecting their business. The site emphasizes the importance of security when using laptops and PCs, especially for entrepreneurs who are active online. | Online & Digital → Internet Services 1004 | browser 139 voip 425 security 6655 | |
| secumailer.nl | SecuMailer | The website describes various products, including Veilig Mailen 3.0 and Aangetekend Mailen eIDAS, focused on the secure sending of sensitive information. SecuMailer emphasizes a user-friendly approach, with security enabled by default and obstacles for senders removed, based on research showing that many employees choose simpler, insecure routes. The platform seamlessly integrates with existing email environments and is suitable for large organizations, minimizing human error in information security. | Services → Email 161 | send 25 email 1012 integration 1451 security 6655 | |
| cybersterk.nl | CyberSterk | The website offers insights into a company’s digital risks through network and website security scans. CyberSterk offers various options, including a basic package with vulnerability reporting, a hacker alert, a compliance check, and a phishing simulation. The company also provides support for problem-solving and security advice. | Data Analysis → Business Intelligence 1002 | alert 78 scan 790 dashboard 1374 risk 2896 package 6112 | |
| tst.nl | TST ict distribution B.V. | TST offers a range of products, including cybersecurity solutions such as AXS Guard Managed Cybersecurity and CyberSterk, and various online training programs. Furthermore, TST offers services such as cybersecurity sales training, executive coaching and IB consultancy to help ICT companies develop their marketing materials and guide clients in the digital transformation. With 30+ years of experience in the ICT sector, TST provides expert advice, practical applications and a personal approach, focused on successfully launching new technologies and services. | Digital Media & Design → Digital Transformation 954 | marketplace 293 cybersecurity 688 transformation 1081 training 28133 | |
| idcontact.nl | ID Contact | ID Contact aims to allow residents to easily and securely manage their personal affairs with the municipality via various channels. The system enables remote identification through different methods, including DigiD and IRMA, and ensures the secure exchange of personal data. ID Contact integrates with existing communication systems and processes personal data quickly, deleting it within 15 minutes after the conversation concludes. | Online & Digital → Digital Services 1008 | communication system 19 authentication 48 identification 76 personal data 93 webinar 870 municipality 6837 | |
| cybercrimetips.nl | Snel Geleerd, Slim Online | The website provides tips on how to protect oneself from hackers and online scammers, including information on fraud via online advertisements, WhatsApp, SMS, phone calls, dating fraud, and fake emails. Stories of victims are shared, and helpful tools are offered to test users' knowledge. The website also provides advice on how to recognize trustworthy online advertisements and identify scammers on social media and sales sites. | Security → Online Security 45 | hacker 17 fraud 200 victim 223 advertisement 1707 tips 2789 tool 3907 | |
| simonplantinga.nl | Simon | The blog post ‘Alarm Clock Interface’ discusses the inefficiencies of traditional digital alarm clock interfaces and proposes a design where minutes increment by 5 for easier adjustments. Another post, ‘Hacking,’ recommends OWASP Juice Shop as a resource for practicing web application security vulnerabilities, highlighting its ease of installation and scoreboard system. The blog also features a post titled ‘Top 10 Programming Languages’ though no details are provided about the content. | Software Development & Engineering → Programming 519 | alarm clock 10 vulnerability 149 programming 575 | |
| 1key.nl | 1Key | 1Key provides cybersecurity, modern workplace management, and network and system management services tailored to businesses. The website offers services such as cybersecurity scans, project management, fixed and mobile telephony, and access to portals for tickets and downloads. 1Key emphasizes the urgency of cybersecurity, given the increasing number of online threats, and offers tools, training, and advice to protect businesses. | IT → Network Management 702 | network management 235 telephony 494 cybersecurity 688 project management 3423 data 5872 | North-Brabant → 's-Hertogenbosch 8868 |
| thelittleblackbox.nl | Redactie | The website covers topics such as cloud computing, cybersecurity, artificial intelligence, Magento import, and Cisco ACI. Practical tips and stories are shared on topics such as creating CVs and cover letters, choosing the right software, and online product management. The website offers news and articles on various business ICT topics, including digitalization, SEO, Google Ads, and DevOps. | Computer Science → Networking 809 | artificial intelligence 291 cybersecurity 688 digitalization 757 cloud 1527 software 8291 | |
| creagraphy.nl | Creagraphy | The company offers custom solutions for both individuals and larger businesses. Creagraphy ensures that websites and email accounts are secure and visitors are not overwhelmed with cookie messages. Clients can directly contact the company to discuss prices and request a quote. | | email 1012 application 3377 security 6655 design 27202 | |
| wikihosting.nl | Wiki Hosting | The website offers articles about the best hosting, including security tips for websites. Information is available on various hosting options, such as shared hosting, VPS hosting, and dedicated server hosting. Wiki Hosting provides information on domain registration and linkbuilding, and the website is written by experts. | Networking & Collaboration → Starting a Business 274 | domain registration 176 webhosting 948 server 1036 domain 1811 hosting 3125 article 6000 | |
| cvth.nl | DIVD | Chris van 't Hof is a cybersecurity expert who makes complex topics accessible to a wide audience from his office Tek Tok. He has conducted research at various institutions and as a freelancer, particularly focusing on the societal aspects of ICT use. He has published several books and publications, including 'Cyberellende was nog nooit zo leuk' and 'Helpful Hackers,' which have been translated into English. Currently, he is the director of DIVD, where he is involved in identifying and reporting vulnerabilities on the internet. | Media → News & Journalism 10827 | hacker 17 vulnerability 149 cybersecurity 688 presentation 1785 research 8967 book 11396 | |
| dhgcomnet.nl | DHG Communications Network B.V. | The company operates with a straightforward approach and offers its investment expertise alongside financial capital. DHG Communications Network B.V. focuses its investments in regions such as The Netherlands, USA, Singapore, India, and Israel. The website highlights past investments and partnerships, including collaborations with investment funds like Peak Capital, 500 Startups, Golden Gate Ventures, and YL Ventures, and covers cybersecurity and technology news. | Investing → Investment Firms 213 | israel 150 capital 152 partnership 1407 investment 2070 technology 6816 | |
| bmpbv.nl | BMP Datapartners B.V. | The company is ISO 27001 and NEN7510 certified, demonstrating its commitment to security and quality management. BMP Datapartners offers a wide range of services, from internet connections and virtualization to 24/7 support and consultancy. Since 1996, BMP Datapartners has been active as a reliable partner, providing complete outsourcing of IT environments. | Technology → ICT 486 | cloud 1527 security 6655 | |
| rivaverzekeringen.nl | Riva Verzekeringen en Administraties | The company offers various types of insurance, including transport, business, and private insurance. Furthermore, they provide administrative services, including accounting, with over 15 years of experience and taking full responsibility for insurance and administrative matters. Riva Verzekeringen en Administraties also offers fleet insurance for various types of vehicles, with options for fixed premiums and discount premiums. | | fleet 1351 risk 2896 account 5781 insurance 6359 administration 6587 | Overijssel → Hengelo 3499 |
| newvm.nl | NewVM | NewVM is certified in ISO27001, NEN7510 and ISO9001 and offers a wide range of IT infrastructure solutions, including colocation, private cloud, public cloud, and hybrid cloud. The website provides virtualization services and IaaS services, with a self-management portal, aiming to maintain customer control over their IT infrastructure. NewVM has been on the map since 2015, founded by a team of technicians with experience in ISPs and hosting, and has grown into a reputable cloud & infrastructure solutions provider. | Software & Computing → Cloud Computing 1253 | virtual machine 18 portal 591 infrastructure 1460 cloud 1527 hosting 3125 certification 3380 | |
| acecompany.nl | ACE | ACE provides strategy and change management consulting services, focusing on niche regulatory expertise within the European financial industry. The company utilizes RegTech and AI to develop secure and efficient regulatory solutions, alongside responsible AI practices to ensure trust and compliance. ACE's services encompass integrated risk management, non-financial risk mitigation, sustainable finance implementation, and compliance support, particularly with regulations like DORA, CSRD, and the AI Act. | Artificial Intelligence → Applications 527 | compliance 506 ai 2181 risk 2896 sustainability 18451 | |
| try-before-you-die.nl | Try-before-you-die.nl | The website covers topics such as artificial intelligence, cybersecurity, programming languages, 5G networks, remote work, augmented and virtual reality, self-driving cars, and chatbots. It offers clarification on the operation of these technologies, including the capabilities of AI, the risks of cybersecurity for SMEs, and the benefits of 5G. The site also discusses current trends, such as the increasing popularity of chatbots and the impact of privacy in the digital age. | Data Science & Analytics → Artificial Intelligence 1831 | programming language 42 5g 46 reality 64 chatbot 137 artificial intelligence 291 cybersecurity 688 | |
| cambionn.nl | Jessica Tran | Jessica Tran has a background in Software Engineering and transitioned to infosec due to a passion for cybersecurity and privacy. She started a personal project in 2021 to reduce her reliance on large technology companies, switching to privacy-friendly alternatives and ultimately removing her last big tech account. The website was initially created to host presentation slides, built quickly using WordPress on a managed service provided by her employer, acknowledging its imperfect code quality. | Personal Wealth → Personal Finance 2348 | cybersecurity 688 privacy 1286 presentation 1785 wordpress 3551 technology 6816 | |
| scmklasse.nl | SCMklasse.nl | The website describes the different Kiwa SCM security classes (1 to 5) and the requirements for each class. It specifically discusses Kiwa SCM/CCV Class 1, also known as ‘Startonderbreker’, and ‘Alarmsysteem’, now referred to as SCM/CCV Class 1. The website provides information about automotive brands that support security, including Audi, BMW, Land Rover and Mercedes-Benz, and also Tesla. | Maintenance & Services → Car Security 11 | alarm 377 certification 3380 | |
| promosystems.nl | Promo Systems | Promo Systems provides IT services including cybersecurity, cloud computing, and an IT helpdesk, specifically targeting the transport sector, both on the road and in offices. The company is recognized for its solutions in automation, system management, and cloud services and serves sectors like the SMB market, government agencies, and education. Promo Systems has a strategic location in the Green Heart in the Alblasserwaard and provides services to clients in various regions, including Amsterdam, Rotterdam, Dordrecht, and Gouda, and offers security awareness training in collaboration with KnowBe4. | IT → System Management 272 | it services 130 cloud services 198 system management 431 cybersecurity 688 automation 2682 transport 6105 | South-Holland → Alphen aan den Rijn 3978 |
| adesinfo.nl | ADES Management Strategies | The website is divided into business units, competence centers, and industry solutions, each offering its own specializations and services. ADES Management Strategies offers integrated, multidisciplinary approaches to achieve productivity gains through strategic, organizational, and cultural improvements. The website blog features recent news articles about IT trends, cybersecurity, AI, and management themes, including news about ransomware, SharePoint hackers, and AI usage by employees. | Software & Computing → Computing 696 | business unit 129 productivity 496 strategy 9379 news 15293 | |
| rsquare.nl | RSquare | The website offers a wide range of services including web development, domain registration, hosting, VPN server configuration, and product development. RSquare highlights the use of modern technologies, such as encryption via DKIM, SSL, and DNSSEC, to ensure user data security and make eavesdropping difficult. Furthermore, RSquare provides advice on improvements to existing IT structures to enhance security against hacking. | Information Technology → IT Security 980 | vpn 167 domain 1811 consultancy 2596 hosting 3125 webdesign 4092 security 6655 | |
| marcelmartens.nl | Marcel Martens | Marcel Martens provides businesses with assistance in securing their organization and increasing productivity. The website introduces the ‘Always Safe in Business’ package, developed by Diny, which helps businesses in the Netherlands to operate safely. The MIT method, consisting of 140 steps, is described as a process that guarantees optimal health of ICT systems and security for the company. | Technical → Security 408 | cybersecurity 688 ict 1049 method 1505 safety 5819 package 6112 | |
| cyberfish.nl | Cyberfish Websites | The website provides various services, including website development, a free demo, and green hosting. Cyberfish Websites emphasizes the speed, security, and Google optimization of their websites, with a focus on a personalized approach and clear results. The company offers standard SSL security, automatic updates, and daily backups, and believes in a sustainable digital world. | | demo 320 hosting 3125 security 6655 | North-Holland → Haarlem 8674 |
| cybergoose.nl | CyberGoose | CyberGoose recognizes that maintaining an organization's security is an ongoing challenge and that employees play a crucial role in preventing cyber threats. The company offers unique board games and training methods designed to engage teams at all levels in learning and applying cybersecurity, emphasizing interactive and fun learning. CyberGoose combines gamification with an interactive learning experience and provides customized security awareness training programs to create a culture of continuous awareness within organizations. | Training → Corporate Training 1331 | cybersecurity 688 awareness 1735 game 2807 training 28133 | |
| heimdallr.nl | Heimdallr Professional Services | The website highlights Heimdallr’s expertise in implementing Zero Trust security, which continuously verifies access requests to safeguard digital assets from evolving cyberattacks, projected to cost businesses trillions annually. It describes the company’s services, including Cloud Security, utilizing technologies like CASB, DLP, and SWG to monitor systems and data across various platforms. Furthermore, Heimdallr promotes the adoption of SD-WAN as a cost-effective alternative to traditional MPLS circuits, offering greater flexibility and performance for modern, cloud-based businesses. | | cloud security 14 threat 62 cybersecurity 688 network 11123 | |
| hallr.nl | Versterkende IT | The website offers services in the areas of OT/IT integration, Wi-Fi, cloud services, and Proxmox VE, including licenses and an application form. Versterkende IT emphasizes the importance of a secure separation between OT (Operational Technology) and IT (Information Technology) to combat cyber threats and ensure productivity. The website focuses on providing flexible, secure, and future-proof cloud solutions and network management, with an emphasis on protecting the digital environment. | IT Services & Consulting → Computer Networking 47 | ot 10 proxmox 17 cloud 1527 it 1539 network 11123 | |
| addsecure.nl | AddSecure | The company offers various solutions for IoT connectivity, including IoT connectivity management, global connectivity, alarm transmission, and a Link Manager Mobile app. AddSecure provides a range of products, including IRIS-4, DALM IP/4G, and various tools such as the IRIS Toolbox and ISA-4, geared toward diverse applications. The website also covers sections for transport and logistics, including fleet management, accuracy, safety, compliance, and sustainability, as well as professional services and customer cases. | Connectivity → IoT 10 | connectivity 173 alarm 377 fleet 1351 transport 6105 security 6655 sustainability 18451 | |
| timvandekamp.nl | CRIPTIM | The CRIPTIM project, conducted at the University of Twente in the Netherlands, addresses the challenge of sharing incident information within critical infrastructure systems due to concerns about data confidentiality. The project introduces a new approach using cryptographic techniques, including secure multi-party computation, homomorphic encryption, and functional encryption, to monitor and analyze incident data in an encrypted domain. CRIPTIM aims to enable external parties to contribute threat-related information to the monitoring system, ultimately leading to more effective and secure critical infrastructure management. | Engineering → Industrial Engineering 270 | security 6655 | Enschede → Calslaan 52 |
| departmentofdesign.nl | Department Of Design | The website includes a blog with articles on topics such as DKIM emails, maintaining window frames, the benefits of a good scent for laundry, and tips for choosing an accounting firm. There is a section with information about cars, including driving lessons, used cars, and lease options for various brands such as Nissan and Polestar. The website also offers information on vacations in the Netherlands, sustainability (lead recycling) and the complexity of car insurance. | | financial 855 office 2898 vacation 4234 security 6655 car 10865 design 27202 | |
| kwaliteit-in-bedrijf.nl | Kwaliteit in Bedrijf | The platform publishes news articles and digital magazines on various topics, including sustainable healthcare, AI, cybercrime, economic developments, and digitalization. Kwaliteit in Bedrijf offers job vacancies and facilitates partnerships, including certifications (such as ISO/IEC 42001) and partnerships with organizations like DNV and AWVN. The website addresses topics such as AI accountability, social responsibility, cyber risks for SMEs, and the challenges of digitalization and circularity for companies. | Information Technology → IT Security 980 | cybercrime 87 organizational development 160 economy 682 ai 2181 magazine 2182 healthcare 2316 | |
| cwgreenport.nl | Cyberweerbaarheidscentrum Greenport | The center offers various services, including advice and guidance, access to cybersecurity experts, current threat information, and workshops, to prepare the sector for the increasing threat of cyberattacks. A crucial factor for digital security is a chain approach, in which companies and suppliers work together to protect their digital connections. The Cyberweerbaarheidscentrum Greenport facilitates this collaboration. The center strives to support companies in the horticulture cluster and provide them with the tools and resources needed to increase their cybersecurity level, with support from experts like André van der Linden, CIO of Royal FloraHolland. | Agriculture → Horticulture & Floristry 1404 | attacks 12 threat 62 security 6655 collaboration 16036 | |
| cryptophobia.nl | cryptophobia.nl | The website addresses political choices with a focus on privacy, eavesdropping, and related issues. The articles are primarily written by the author themselves and have sometimes been published on other websites. The website covers both serious topics related to cryptography and encryption, as well as more lighthearted, personal pieces. | Legal → Privacy 596 Software & Computing → Cryptography 13 | cryptography 31 encryption 50 privacy 1286 article 6000 blog 13392 | |
| ikhebcyberkracht.nl | Cyber Strength | The website presents a series of articles, blogs, podcasts, and reports on cybersecurity. It offers a step-by-step guide of six basic steps for safely conducting digital business. Cyber Strength emphasizes the importance of proactive security measures to prevent cyberattacks. | Marketing & Branding → Entrepreneurs 562 | cyberattack 21 vulnerability 149 virus 195 updates 200 cybersecurity 688 | |
| infrapuin.nl | infrapuin.nl | The company helps businesses consolidate and manage their IT infrastructure, emphasizing cybersecurity and reliability. The offered services include Hardened Enterprise Linux as a Service, which is 97% cyber-resistant and doesn't use risky remote access tools, but provides a virtual employee for permanent monitoring and maintenance. Furthermore, the company provides Dedicated Workforce as a Service with dedicated staff and Kubernetes as a Service, enabling customers to set up a flexible and scalable infrastructure. | Software & Computing → Cloud Computing 1253 | migration 349 cybersecurity 688 server 1036 infrastructure 1460 cloud 1527 | |
| zusenzomedia.nl | Zus enzo Media | The company provides articles and blog posts on relevant topics such as the marketing opportunities of TikTok and the benefits of re-board material. Zus enzo Media specializes in SEO, web design, cybersecurity, and local marketing strategies, emphasizing local partnerships, such as in Leiderdorp. The website covers topics such as the future of web design, the strategic value of web design agencies, and the importance of cybersecurity for businesses. | Administrative Support → Business Operations 1156 | tiktok 176 cybersecurity 688 seo 3707 webdesign 4092 | Gelderland → Apeldoorn 6996 |
| dotcombusiness.nl | Dotcombusiness | Dotcombusiness supports businesses with smart IT solutions, starting with understanding the role of IT within the organization and its contribution to success. The company offers a wide range of services, including connectivity and telephony, Microsoft 365 and Teams, Wi-Fi, hardware and software, narrowcasting, managed workspaces, cybersecurity scans, network and system management, and information security. Dotcombusiness focuses on the SME (small and medium-sized enterprises) and provides IT solutions to diverse sectors, such as financial services, real estate, law firms, and healthcare practices. They emphasize an approach that ensures the continuity and productivity of their clients' IT environments. | IT → Managed Services 720 | microsoft 365 430 sme 466 cybersecurity 688 it 1539 consulting 3639 network 11123 | |
| scherper.nl | Weekblad voor Nederland | An article describes the operation of external defibrillators and the challenges involved in delivering an effective shock to the heart. Another article provides tips on how to increase internet speed on an Android phone and how to address slow internet connections. A third article discusses the importance of properly charging a smartphone's battery and mentions tips for extending battery life. | | 3d printer 104 gadget 477 smartphone 1344 internet 1678 | |
| adviescentrumbvi.nl | BVI Advisory Center | The center advises on various aspects such as all-hazard risk analysis, cyber security, BREEAM, NIS2, and various standards such as HEA11 and RSL10. They support organizations in developing security policies, taking into account people, culture, regulations and compliance (GRC), and offer security scans to identify 'gaps' and risks. BVI offers services such as risk analysis, measure selection, security advice, and support for BIA and BCM, utilizing a validated methodology and certified standards such as ISO 22301. | Insurance & Risk → Risk Management 1060 | breeam 24 business continuity 33 risk management 543 scan 790 risk 2896 security 6655 | |
| innovedia.nl | Innovedia | The website discusses the importance of cybersecurity and the role of users in combating cybercriminals. Questions are answered about the use of Windows virus scanners and whether a VPN is needed when downloading files. The website explains what a WiFi amplifier does and why it may be necessary when using mobile devices with WiFi. | Networking → WiFi 91 | vpn 167 cybersecurity 688 wifi 1372 window 2030 | |
| cyberveiligwestfriesland.nl | Cyberveilig West-Friesland | The website offers information and helpful links for entrepreneurs who have encountered cybercrime, such as reporting cyberattacks or identity fraud. Cyberveilig West-Friesland offers affordable solutions to increase the digital resilience of companies, including a security assessment and a systematic improvement process. Through presentations and workshops, awareness and action perspectives are encouraged to continuously improve cybersecurity. | | cybercrime 87 cybersecurity 688 presentation 1785 network 11123 | De Fryske Marren → Lemmer 1188 |
| auditandrisksolutions.nl | Audit & Risk Solutions | The company offers various services including independent audits, risk analysis, and solutions for complex business issues. Audit & Risk Solutions helps organizations identify and manage risks, document business processes, and provide training in audit and risk management. The company serves organizations of all sizes and in various sectors, with a particular focus on the pension and transportation sectors. | Accounting → Auditing 176 | audit 622 risk 2896 training 28133 | South-Holland → Zoetermeer 4046 |
| cyberweerbaarnl.nl | Cyberweerbaar NL | The Cyberweerbaar NL expertise network focuses on identifying the behavioral and attitudinal aspects that influence cyber resilience and how organizations can improve them. It provides employees with tips and research, practical tools and methods to become more resistant to cyber threats. Cyberweerbaar NL is funded by three colleges: De Haagse Hogeschool, Hogeschool Saxion and NHL Stenden Hogeschool and works with students, teachers, cyber professionals and partners to develop cybersecurity knowledge. | Relationships → Partnerships 481 | behavior 1779 knowledge 3528 research 8967 | |
| inlogkaartje.nl | Oypo | Users can upload and manage their photos online by logging in with a login card or creating their own account. With an account, users can save login details and easily order photos from multiple years. The website also provides links to terms and conditions, privacy information, contact details, and product safety information. | Image Products → Photo Printing 54 | login 160 password 213 code 509 privacy 1286 account 5781 photo 7778 | |
| vanbarenhosting.nl | KoDDoS | The portal provides detailed articles, practical tools, and proven strategies aimed at digitizing operations and improving business agility. A significant focus is placed on securing digital infrastructures through the latest technologies and security protocols, including encryption and regular audits. The website highlights the importance of efficient data management, utilizing tools like Google Cloud and Power BI to enable data analysis and informed decision-making, further showcased through success case studies. | Digital Media & Design → Digital Transformation 954 | digital transformation 215 tool 3907 data 5872 security 6655 strategy 9379 | |
| duurzamedrager.nl | DuurzameDrager.nl | The website utilizes a ‘digital fingerprint’ to guarantee that documents, such as insurance terms and conditions, cannot be altered after their initial issuance. By storing the digital fingerprint in a database and continuously checking if the link to the document still displays the correct fingerprint, the authenticity of the terms is assured. Although insurers can adjust the terms during the policy’s lifespan, the website guarantees that these adjustments are communicated promptly and that the link to the terms always still leads to the most recent version. | Law → Consumer Law 181 | database 1153 | |
| csusecurity.nl | Csusecurity | The site discusses the importance of replacing locks as a strategic move for improved security. It provides an explanation of the need for pentests for cybersecurity, emphasizing the importance of proactive measures against cyberattacks. The website describes the functionality and benefits of surveillance cameras for home and property. | Safety → Home Safety 17 | surveillance camera 92 cybersecurity 688 locks 953 childcare 3512 safety 5819 | |
| thomasvanderberg.nl | Thomas van der Berg | The blog post from July 27, 2024, details the process of correcting font order for CJK characters on an Ubuntu Linux system, as the system was initially rendering Japanese characters instead of Chinese simplified characters. An August 16, 2022, post describes how the author addressed beginning RSI symptoms by scripting a solution (kbmenu) and adjusting his computer ergonomics, stemming from a demanding pentest report and new windowing system usage. A blog post from April 14, 2022, highlights the ability to utilize the KDE filechooser within Firefox and other GTK applications, facilitated by the xdg-desktop-portal project. | Operating Systems → Linux 255 | rsi 25 ubuntu 68 script 532 | Friesland → Leeuwarden 6068 |
| safeweb.nl | Safeweb | Safeweb tests websites for security vulnerabilities by applying hack techniques without damaging the website itself. The service works in stages: obtaining consent for testing, applying techniques, reporting findings and recommendations, and verifying the implementation of security measures. After the first test, they may perform additional tests to ensure all vulnerabilities have been addressed and the website is truly ‘hack proof’. | | hack 36 vulnerability 149 report 4551 security 6655 | |
| utmshop.nl | UTMSHOP.nl | The website provides a wide range of Sophos products, including firewalls (XGS and SD-RED), access points, switches and modules. UTMSHOP.nl positions itself as the Dutch business partner of Sophos and offers advice, support and full configuration and implementation of Sophos solutions. The website emphasizes fast delivery, expert advice, and free shipping. | Computer Science → Networking 809 | access points 10 firewall 51 switches 68 | |
| inlichtenkracht.nl | Inlichtenkracht | The site covers topics such as linkbuilding, antivirus software, computer games, cybersecurity, and confidentiality declarations. It presents articles and updates on trends in the IT industry, including hardware, software, telecom and HR solutions. The website offers various categories such as digital, internet, and general technology information, using a calendar structure for publication dates. | Technology → ICT 486 | antivirus software 17 linkbuilding 473 cybersecurity 688 software 8291 training 28133 | |
| deictscan.nl | Heiper ICT | The Heiper ICT scan provides comprehensive insight into the current ICT infrastructure and can expose security vulnerabilities. The company conducts the scan by a system administrator who maps the client’s ICT environment on-site and advises on possible improvements. The scan procedure consists of an introductory meeting, the execution of the scan, the preparation of a report with insights and explanations, and encouragement to take immediate action based on the findings. | Information Technology → IT Security 980 | system administrator 22 recommendation 120 report 4551 | |
| dpepreventie.nl | De Preventie Experts | The company offers both (internal) fraud investigations and preventative services to protect organizations against internal and external threats. A significant portion of the financial damage caused by corporate fraud in the Netherlands amounts to 5 to 6 billion euros annually. De Preventie Experts emphasizes the need to consider both external and internal risks when implementing preventative measures. | Risk Management → Fraud Prevention 10 | integrity 205 risk 2896 | |
| mathmatch.nl | Mathmatch | The site contains articles about mathematics and daily life, demonstrating surprising connections. There are articles about design trends for product designers, daylight tubes versus light domes, nuts, seeds, and their market, skin aging, and inflatable water parks. The website also offers job postings, such as a Senior SAP CC/CI Consultant in Utrecht and information on notary services in Groningen. | Educational Support → Tutoring 681 | mathematics 393 legal 937 skin 2518 architecture 3223 food 3872 design 27202 | |
| jeffreyt.nl | Jeffrey Tigchelaar-Moerbeek | One article discusses the ability to create shared mailboxes with integrated Microsoft Bookings pages without requiring administrator access. Another article details the author's personal goals for 2024, including skill development in automation, architecture, and governance within the IT security field. The website includes sections for 'About,' 'Tags,' 'Archive,' and 'Categories,' suggesting a blog format with organized content. | Career → Career Development 1070 | microsoft 365 430 bookings 523 governance 610 cybersecurity 688 automation 2682 | |
| scheffersolutions.nl | Scheffer Solutions B.V. | The company offers a range of ICT solutions, including system management, network management, cybersecurity, VoIP telephony, and backup. Scheffer Solutions provides a total outsourcing concept, acting as a central point of contact for all ICT-related matters and ensuring 24/7 monitoring and unlimited helpdesk support. The website offers a free ICT check, where a plan with improvements and opportunities for the company's IT environment is drawn up. | Business Services → Customer Service 1451 | check 181 network management 235 system management 431 cybersecurity 688 ict 1049 | Gelderland → Nijmegen 9384 |
| knicklighter.nl | Patrick de Brouwer | Patrick de Brouwer is a security professional offering services including vulnerability scans, penetration tests, and course material creation related to ethical hacking and practical hacking techniques. His experience extends to working with diverse clients, from small businesses to financial and governmental organizations, highlighting the importance of robust security measures. De Brouwer’s background includes certifications such as GIAC Certified Incident Handler (GCIH), Offensive Security Certified Professional (OSCP), and Offensive Security Wireless Professional (OSWP), alongside documented vulnerability research and event appearances. | Software Development & Engineering → Programming 519 | hack 36 certification 3380 event 45199 | |
| vitaen.nl | Vitaen | Vitaen delivers independent security expertise and advises on security challenges, aiming to ensure clients can work and live safely. Vitaen’s service package is tailored and flexible, offering solutions including security consultancy, ethical hacking, and cyber awareness training. Vitaen boasts experienced professionals in crime prevention and crisis management and has already assisted several organizations in improving their security measures, such as Bel Groep and INSHARED Company. | | consultancy 2596 risk 2896 security 6655 network 11123 training 28133 | South-Holland → The Hague 19898 |
| aplusprofessional.nl | Aplus Professional | The website offers an overview of various IT services, including IT management, security solutions, online workspaces, and online backups. The website describes TotalCare as a comprehensive IT management package with security, consulting, and support, and highlights the benefits of cloud-based workspaces and virtual phone centers. Aplus Professional, established in 1991 in Alphen aan den Rijn, offers IT automation and works with a team of 15 people to serve companies in the Netherlands. | IT → Managed Services 720 | security solutions 23 it management 150 cloud solutions 281 voip 425 sea 782 | South-Holland → Alphen aan den Rijn 3978 |
| huntit.nl | Hunt IT Detachering | Hunt IT Detachering offers detachment, managed services, projects, and training to ICT professionals. The website provides an overview of available vacancies, including DevOps Engineers, Architects, Developers, and Tester Mendix, with locations in various cities. Hunt IT facilitates the match between companies and professionals by fulfilling vacancies, sending job alerts, and keeping abreast of developments. | HR Services → IT Recruitment 447 | detachment 266 cloud solutions 281 infrastructure 1460 vacancy 6598 training 28133 | South-Holland → The Hague 19898 |
| werkenbijspl.nl | SPL | SPL offers secure digital infrastructure, allowing clients to work worry-free and from anywhere. The company emphasizes a close-knit team, where employees are valued and seen. The website presents job vacancies and introduces the leaders of SPL, as well as some employees with specific functions. | | it-infrastructure 19 job vacancies 1241 innovation 4659 marketing 7107 | Gelderland → Arnhem 8680 |
| beveiliging-winkels.nl | beveiliging-winkels.nl | The website covers trending news about security, such as coffee machines, festivals, digital and physical security, alarm systems, VPNs, and cybersecurity trends. Articles address specific topics like mileage tracking, legal aid, password managers, security cameras, business addresses, link building, locks, core pull security, and burglary attempts. The website also offers job vacancies for security guards in Utrecht and Den Haag, information about insurance, and links to reliable security cameras from brands like Hikvision and Dahua. | Safety → Crime Prevention 59 | lock 368 camera 1733 office 2898 insurance 6359 vacancy 6598 security 6655 | South-Holland → The Hague 19898 |
| sl2a.nl | SL2A ICT | SL2A ICT offers a variety of IT services, including cloud services, data management, patch and server spaces, printing and scanning solutions, and service & support. The company also provides AV solutions such as narrow casting, space reservation, and digital signage. The website emphasizes security, particularly in preventing data breaches and managing vulnerabilities in the IT environment. SL2A ICT offers solutions such as vulnerability management, honeypots, and Trustifi mail. The company offers total solutions for managing IT environments remotely, including monitoring and virtualization, and specializes in the implementation of SAN and NAS environments. They also provide reliable internet connections for the maritime sector. | Software & Computing → Cloud Computing 1253 | data management 83 cloud services 198 internet 1678 security 6655 | |
| bitsiel.nl | Bitsiel | Bitsiel offers various security solutions, including monitoring, password management, and SIEM solutions, focused on managing access systems and data. The services offered encompass MSP, SOC, remote support, data loss prevention, data transfer control, Zero Trust Segmentation and implementation support, aiming to optimize and secure the IT infrastructure. Bitsiel works with clients from various sectors, such as ministries, educational institutions, and companies, and is an authorized partner of several important software vendors. | Computer Science → Networking 809 | password 213 monitor 1063 infrastructure 1460 partner 4272 security 6655 | |
| dcwc.nl | Dutch Cyber Warfare Community | The website provides information about the organization, its history (existing since 2012), and the activities of the community. A key component is the forum and event agenda, featuring regular Roundtables, including the 30th edition on July 3, 2025. The website informs about recent news reports and announcements, such as the 2nd Roundtable of this year and the speakers present. | International Cooperation Projects → International Relations 465 | roundtable 18 geopolitics 23 speaker 1481 community 7931 news 15293 event 45199 | |
| techidee.nl | Techidee.nl | The website provides news, analysis, and insights on a variety of technological topics, from gadgets to groundbreaking discoveries. Techidee.nl strives to provide readers with accurate and reliable information, with the goal of inspiring them and helping them understand the technological trends shaping our world. The website features recent articles about various cybersecurity incidents and AI developments. | News & Journalism → News Websites 340 | cybersecurity 688 insights 976 analysis 1615 innovation 4659 technology 6816 news 15293 | |
| technetpersoneel.nl | Technet Personeel | The website presents news about the technical sector and specific topics such as IT and cybersecurity. Tips and advice are given on the maintenance and security of IT systems, with a focus on preventing problems. The site contains articles about SEA (Search Engine Advertising) and its potential benefits. | Networking & Collaboration → Starting a Business 274 | sea 782 it 1539 security 6655 news 15293 | |
| it-products.nl | Sophos | Sophos MDR offers a comprehensive cybersecurity solution combining technology, expertise, and analysis to protect businesses against advanced cyber threats. Sophos delivers cybersecurity results through managed detection and response (MDR) and other products such as firewall, email, and endpoint security, managed via Sophos Central. Setting up Sophos MDR takes only a few minutes and is managed through the Sophos Central management console, utilizing machine learning and intelligence to identify relevant threats. | Information Technology → IT Security 980 | central 14 threat 62 cybersecurity 688 | |
| legal-translation.nl | legal-translation.nl | The site publishes articles about cybersecurity risks for e-commerce companies and how to prevent them. It also provides VAT tips for entrepreneurs, covering the important aspects of this tax. Starting a new language course can be exciting, but the most important thing is that a strong brand emerges through what you do, not just what you say. | Communication & Content → Translation 1053 | legal translation 14 vat 432 cybersecurity 688 e-commerce 738 brand 17737 | South-Holland → The Hague 19898 |
| appgratishacken.nl | HackApp LLC | The website addresses the security vulnerabilities of popular apps such as WhatsApp, Instagram, and Snapchat, highlighting that hacking these apps is relatively easy with the right software. It offers free software for hacking WhatsApp and Instagram, including WhatsApp Hacker Deluxe Software and Instagram Hackers. The website promotes the software as 100% free and approved by both the website owners and users, with attention to functionality and safety. | Software Development & Engineering → Programming 519 | hack 36 app 4595 security 6655 software 8291 | |
| probability.nl | Probability & Partners | The website offers services related to risk management, including risk assessments, regulatory compliance, climate risk, and model validation. Probability & Partners focuses on delivering a cohesive risk framework and facilitates a seamless transition from advisory services to implementation. The company provides expert support in various areas of risk management, such as asset management, banking, insurance, and pensions, alongside IT and cybersecurity solutions. | Insurance & Risk → Risk Management 1060 | framework 283 risk management 543 cybersecurity 688 consultancy 2596 risk 2896 | North-Holland → Amsterdam 41253 |
| rootsec.nl | Rootsec | Rootsec is a Dutch cybersecurity specialist based in Almere, offering advanced security solutions and customized services. The website details a wide range of services, including penetration testing, red teaming, vulnerability assessment, incident response, and managed XDR. Rootsec emphasizes an innovative approach, including a ‘Hacklaptop’ for internal penetration testing, and states that they are a partner prioritizing the customer’s safety. | Information Technology → IT Security 980 | penetration testing 43 threat 62 incident 335 security 6655 | |
| xentronix.nl | Xentronix | Since 2001, Xentronix has operated as an internet service provider and provides its services from advanced data centers in the Netherlands. Xentronix's internet services utilize A-brand hardware, including Cisco, HP, Dell, and SuperMicro, to guarantee high speed and stability. Xentronix offers various hosting and reseller packages, including web hosting and server rentals, with prices starting from €2.99 and €59.95 per month. | Online & Digital → Internet Services 1004 | data traffic 35 server 1036 internet 1678 domain 1811 hosting 3125 package 6112 | |
| pmsoft.nl | PMSoft | PMSoft offers a range of services, including the development of websites and internet applications. The company emphasizes creativity, perseverance, and customer satisfaction. PMSoft highlights expertise in CMS WebEdition, programming of internet scripts, and web scraping, and DotDigital support. | Programming Languages → PHP 400 Online & Digital → Internet Services 1004 | script 532 cms 613 | |
| netboss.nl | NetBoss | NetBoss helps organizations to continuously visualize cybersecurity risks and how to address them, using innovative solutions. The services include insight into IT/OT/IoT and Cloud assets, automated vulnerability scans, autonomous penetration testing, risk centers (ROC), patch management, and compliance reporting. NetBoss also provides ZTNA-based network solutions and managed services such as training and advice. | IT → Managed Services 720 | penetration testing 43 compliance 506 asset 591 cybersecurity 688 risk 2896 | |
| tekstklik.nl | Tekstklik | The website offers daily blogs on a variety of media topics, keeping visitors informed. The platform covers topics such as marketing trends (TikTok), business growth, linkbuilding, chatbots, SEO, and the influence of social media on journalism. Visitors can read blogs about topics such as ‘TikTok: the marketing trend that you shouldn’t miss’ and ‘Effective digital techniques for business growth.’ | Hobbies → Blogging 146 | chatbot 137 linkbuilding 473 medium 1293 seo 3707 marketing 7107 blog 13392 | |
| switchmail.nl | Switchmail | The website provides various email packages, including a combination package that combines encryption and archiving. Users can easily send and receive encrypted emails, and quickly search through their emails. Switchmail offers strong authentication methods for login security on encrypted and archived emails, providing legally binding archiving. | Software & Computing → Computing 696 | authentication 48 encryption 50 demo 320 email 1012 archive 2067 package 6112 | |
| zenithsecurity.nl | Zenith Security | Zenith Security is a security system integrator that offers innovative security solutions and corporate research services, advice and training. Zenith Security’s technology combines advanced systems with human input and is managed through a Security Management System. Zenith Security provides investigations and legal evidence gathering in cases of fraud or misconduct, as well as practical preventative training programs. | Security & Surveillance → Security Services 445 | security 6655 technology 6816 research 8967 training 28133 | Vijfheerenlanden → Vianen 707 |
| technite.nl | Technite | The website covers topics such as domain 'crosstemming' (registration of business and service names), the withdrawal of domain names by Tesla from Russia, and the requirements that Amsterdam imposes on data centers. An article discusses Google’s potential impact on the domain market and how the company wants to make money with domain names. The website also publishes analyses and articles, such as the comparison between mountains and IT, as well as statistics on the number of cancelled .com domain names. | Providers → Domain Names 1466 | data centers 46 domain names 129 google 192 cybersecurity 688 | |
| ronin-ict.nl | Ronin ICT | Ronin ICT provides a variety of ICT services, including consultancy, cloud solutions, workplace management, software implementation, and network security. The company has over 15 years of experience advising and managing the IT environment of the SME sector in the regions of Amsterdam, Zaandam, Haarlem, and The Hague. Ronin ICT focuses on delivering secure and reliable solutions, particularly focused on cybersecurity and providing direct support to clients. | | cybersecurity 688 ict 1049 cloud 1527 consultancy 2596 network 11123 | Zaanstad → Zaandam 2740 |
| veilig-wachtwoord.nl | nu.nl | The website provides an example of password generation using random words and suggests using a story to remember it. It is advised to test passwords with tools like ‘How secure is my password’ and not to use the same passwords for multiple accounts. The website discusses the problems with mandatory password changes, such as small adjustments and the use of easily guessable passwords, and advocates for longer, but easy-to-remember passwords. | Health & Wellbeing → Personal Development 9481 | adjustment 114 password 213 security 6655 story 8285 | |
| resultaat-verbetering.nl | Resultaat Verbetering | Ron offers sales coaching and business coaching services to improve the performance of sales teams and generate more leads. He has extensive experience in the sales and coaching sector, and recently specializes in cyber security, having completed an HBO degree in the field. Clients describe Ron as an open, honest, and hardworking team leader who effectively develops and executes plans. | | business coach 37 cybersecurity 688 lead 1195 sale 5930 | |
| smartcomsecurity.nl | SmartCom Security | SmartCom Security is a distributor and partner of ESET and provides a comprehensive security package. The platform offers protection for Windows, Mac, Android, and Linux devices, with integrated Mobile Device Management. SmartCom Security handles license sales of ESET products through their own security portal and offers technical support. | Security & Surveillance → Security Services 445 | license 1288 security 6655 | |
| ondertekenverzoek.nl | Ondertekenverzoek | The Ondertekenverzoek platform is certified according to various standards, such as ISO27001, SOC 3 Type II and eIDAS, guaranteeing the security and reliability of the service. Users can send and sign documents within a few minutes, with options for automated reminders and the ability to add text fields and checkboxes. The service offers personalization options, allowing users to send signing requests with their own branding and their own domain, which helps prevent spam and provide a professional customer experience. | Business Software → Document Management 328 | signature 60 document 1678 domain 1811 security 6655 | |
| security-tower.nl | Security Tower | The company offers a range of services focused on protecting businesses from cyber threats, including threat detection, risk management, and vulnerability scanning. Security Tower provides comprehensive security assessments through detailed questionnaires and system scans to identify weaknesses in a business's infrastructure and processes. The website highlights key services such as awareness training, vulnerability assessments, and mitigation strategies to bolster a company's overall cybersecurity posture. | | threat 62 vulnerability 149 cybersecurity 688 assessment 1205 risk 2896 security 6655 | |
| b-comonline.nl | B-COM ONLINE | B-COM ONLINE is an online organization active in e-commerce, where goods and services are sold and purchased via the internet. Information security focuses on protecting information from unauthorized access and ensuring the confidentiality and integrity of data. Privacy protection safeguards personal information from unauthorized access and gives individuals control over how their data is collected and used. | Information Technology → IT Security 980 Legal → Privacy 596 | information security 217 transaction 613 e-commerce 738 | |
| idverificatie.nl | IDverificatie | The website provides various tools, including the IDverificatie App, which allows users to perform real-time checks on identity documents with their smartphone. ID CheckIn is a service that allows identity documents to be checked remotely by sending a secure URL. The platform also offers functionalities such as checking MRZ codes, validating NFC chip security certificates, and performing relevant checks such as CDD customer due diligence and ID-Check (VIS). | Insurance & Risk → Risk Management 1060 | url 52 sms 97 check 181 document 1678 app 4595 | |
| jaccomeijer.nl | Jacco Meijer (CISSP) Solutions | The website features blog posts related to IT architecture, cyber security, threat modeling, security frameworks, and Enterprise Architecture. Jacco Meijer discusses the integration of ISO 27001, NIST CSF, and threat modeling with Enterprise Architecture to enhance security. The blog includes articles on managing cyber security risk using ISO 27001 and NIST CSF. | Technology → IT 3337 | framework 283 cybersecurity 688 risk 2896 architecture 3223 | Netherlands → Utrecht 48901 |
| ismijnbedrijfveilig.nl | Mijn Bedrijf Veilig | The website provides a CyberCheck that allows users to assess their company's cybersecurity in just one minute and receive simple tips. Free resources, such as the Phishing Check and guides for securing applications, are available to help businesses protect themselves against cyber threats. The website also offers news and updates on the latest cybersecurity trends and incidents, with examples from current events. | IT Security → Business Security 18 | phishing 34 cybersecurity 688 application 3377 news 15293 | |
| onnohansen.nl | EU | Onno Hansen-Staszyński is involved in various projects related to combating disinformation, including his role as project officer for the EU project SAUFEX and as a member of expert groups within the European Commission and the Dutch Ministry of Internal Affairs. His work encompasses numerous speaking engagements and participation in conferences addressing topics like societal resilience, digital literacy, and countering hybrid threats, demonstrating his involvement at both European and international levels. Beyond his official roles, Hansen-Staszyński is engaged in educational initiatives, including co-authoring programs like Interdemocracy and contributing to pilot projects concerning age verification and digital identity management. | Information Technology → IT Security 980 | speaker 1481 member 10154 education 13471 | |
| anovum.nl | Anovum | The website describes a wide range of services, including penetration testing for web applications, infrastructure, APIs, and mobile applications, as well as digital forensic investigations. Anovum emphasizes the use of AI solutions, specifically the Neurashield AI platform, and offers training programs and awareness campaigns to improve the cybersecurity of organizations. The website highlights core values such as independence, transparency, and knowledge, and offers 24/7 support for cybersecurity incidents, with the option of complete outsourcing. | Information Technology → IT Security 980 | incident 335 cybersecurity 688 assessment 1205 ai 2181 | |
| ccrc.nl | Cyber Chain Resilience Consortium (CCRC) | CCRC is a collaboration of partners from the public and private sectors focused on improving cooperation and protection during cyber crises. The website offers various services, including cyber exercises, professional guidance, manuals, podcasts, blogs, templates, and white papers. The focus is on training incident response teams, increasing awareness, and improving the organization-wide approach to cyber crises. | Insurance & Risk → Risk Management 1060 | training 28133 | |
| cloudlife.nl | Cloud Life | Cloud Life is an expert in cybersecurity and data security, providing tailored solutions for a safe future. The company is part of the Microsoft Invitation-Only Security Alliance (MISA), an exclusive worldwide security network of Managed Security Service Providers (MSSP). Cloud Life offers various services, including Protect 365 for detection and response, managed security, and security adoption and awareness training, and helps organizations comply with regulations such as GDPR and ISO27001. | Business Software → Cloud Solutions 82 | data security 20 detection 128 azure 222 microsoft 365 430 cybersecurity 688 | |
| beerepootautomatisering.nl | Beerepoot Automatisering | The company focuses on identifying and addressing risks through a planned approach, including network scans and offering cybersecurity solutions. Cybercrime is growing globally, and the associated costs for businesses can be significant, averaging €270,000 per incident. Beerepoot Automatisering offers consultancy, implementation, and maintenance of IT systems, with a team of 50 professionals, focusing on reliability, engagement, and competence, with partnerships with leading companies such as Microsoft, Kaspersky, and Sophos. | Information Technology → IT Security 980 | cybercrime 87 implementation 1029 it 1539 plan 2566 security 6655 network 11123 | |
| risqit.nl | RisQIT | RisQIT helps organizations guarantee the quality of their systems and products through software testing and the identification of potential problems. The website describes various testing services, including functional, technical, and automated testing, as well as security testing such as penetration testing and audits. RisQIT promotes a culture of knowledge sharing and continuous improvement within a Test Guild, where experiences are exchanged and the quality of the service delivery is monitored. | Software Development & Engineering → Testing 174 | software testing 17 risk 2896 security 6655 | |
| securiguide.nl | SecuriGuide | The website features news and background information on cybersecurity, including details on cyberattacks and their associated damages. It lists job vacancies for cybersecurity professionals and provides information on training opportunities in this field. SecuriGuide offers tools such as a security scan to assess website security and provides tips for improving security, including a WordPress security plan. | Technology → IT 3337 | job postings 676 cybersecurity 688 news 15293 training 28133 | |
| mkbcyberadvies.nl | MKB Cyber Advies Nederland | The website focuses on entrepreneurs, directors, and executives who are responsible for the cybersecurity resilience of their organization. MKB Cyber Advies Nederland provides independent advice and training, and can help with questions about personal data and the AVG (GDPR). The organization functions as a sparring partner, offering scanning, advice, and training tailored to specific needs. | Real Estate → Enterprises 162 | issue 214 cybersecurity 688 training 28133 | |
| winsecure.nl | Hogeschool Windesheim | WinSecure delivers high-quality IT security services in collaboration with partners. The organization offers various services, including customized advice, cybersecurity audits, and incident response plans. WinSecure aims to increase cybersecurity awareness among companies and contribute to a strong cybersecurity community in the Zwolle region. | Higher Learning → Higher Education 3584 | audit 622 plan 2566 partner 4272 security 6655 community 7931 | Overijssel → Zwolle 7395 |
| digitpol.nl | DIGITPOL | DIGITPOL offers operational support in the search and recovery of stolen vehicles, including cars, trucks, and motorcycles, for insurance companies. The company specializes in criminal investigative services, particularly in the area of vehicle crime and the use of telematics systems for intelligence and investigations. DIGITPOL has a digital forensics team that specializes in analyzing digital evidence from various digital devices to support law enforcement agencies and others. | Government & Administration → Law Enforcement 55 | telematics 36 intelligence 81 investigation 400 vehicle 3743 security 6655 | |
| cybernetwerk.nl | Cyber Netwerk Drechtsteden | The CND raises awareness of the risks of digitalization and cyber threats among SMEs in the Drechtsteden region, emphasizing the importance of cyber resilience. By providing resources and tools, the CND offers businesses practical guidance to strengthen their own resilience. The partnership consists of various organizations, including VitrumNet B.V., HBO Drechtsteden, and Digital Mainport Drechtsteden, and works to increase cyber awareness and strengthen cyber resilience. | Governance → Law 14133 | cyber threats 15 partnership 1407 network 11123 | South-Holland → Drechtsteden 416 |
| cprm.nl | JA Alpha | The website offers various services related to GDPR implementation, audits, training programs, and risk management, including DPO as a Service, GDPR implementation & coordination, and DPIA Training. Training opportunities are offered on GDPR/Privacy, Cybersecurity Awareness, and Data Leak Prevention. There are also e-learning options. JA Alpha provides consulting services on the topics of privacy, information security, risk management, and organizational resilience, with services such as gap analyses, audits, and supplier audits. | Privacy → Data Privacy 36 | gdpr 179 risk management 543 audit 622 cybersecurity 688 training 28133 | |
| datarely.nl | DataRely | The website offers various services including data reliability scans, consultancy, managed services and cyber protection. DataRely focuses on securing and managing business data with over ten years of experience in cyber protection, specifically for Microsoft Cloud environments. The company provides advice, analysis and backup solutions, emphasizing transparency, security and insight. | Information Technology → Data Management 827 | managed services 95 analysis 1615 consultancy 2596 data 5872 security 6655 | |
| lichtuitspotuit.nl | lichtuitspotuit.nl | The website discusses cybersecurity, describing how it’s crucial for protecting systems against digital attacks, aiming to gain access to information, modify it, or destroy it. It also covers effective project management using planning tools, which help teams maintain overview, set priorities, and monitor task progress. Furthermore, it addresses business databases, which function as digital storage places for valuable business information, and presents a step-by-step guide for creating a new website. | Information Technology → IT Security 980 | cybersecurity 688 database 1153 project management 3423 | |
| nk-phishing.nl | Surelock | The NK-Phishing is a competitive event with a significant prize, in which organizations compete to excel. Teams can register for free and are challenged to prove that their organization is not vulnerable to phishing. After the championship, all participants will receive a report detailing the phishing emails sent and an analysis of how their team could have recognized them. | Data Science & Analytics → Data Analysis 1494 | phishing 34 simulation 241 report 4551 competition 4759 | |
| helixis.nl | Helixis | Helixis offers strategic advice and practical implementation of information security measures, ranging from risk analysis to 24/7 monitoring and training programs. The website details various services, including consultancy, implementation, partnerships, training (such as ISO 27001, DORA, and NIS2), and products like an SMB total solution. The website provides practical information on topics such as information security, NIS2, and ISO 27001, and offers a step-by-step roadmap for security. | Insurance & Risk → Risk Management 1060 | information security 217 implementation 1029 monitor 1063 risk 2896 training 28133 | |
| koekiesenzo.nl | Koekies enzo | The website contains articles about how cybersecurity can affect financial stability and the importance of professional CVs for modern careers. Tips are given on improving online visibility through SEO, Google Ads, and online good found, as well as connecting websites with APIs. The site covers topics such as efficient work with logistics tools and the importance of online visibility for businesses, as well as advice on interior design choices. | Online & Digital → Digital Services 1008 | api 276 cv 516 cybersecurity 688 logistics 3257 seo 3707 interior 8093 | |
| seqrit.nl | SEQRIT | Cybersecurity is crucial for organizations and individuals in the current digital age due to increasing vulnerabilities. The NIS2 legislation applies to many organizations, both in ‘essential’ sectors and for businesses deemed ‘important’ by the government. SEQRIT offers cybersecurity expertise and works with organizations to determine and manage acceptable risk levels, considering the specific characteristics of the organization and the availability of seven offices in the Netherlands. | IT → Managed Services 720 | ot 10 cybersecurity 688 cloud 1527 it 1539 risk 2896 | North-Holland → Diemen 975 |
| misshack.nl | MissHack | The company offers services for quickly removing hacks within 24 hours, with a 30-day guarantee. MissHack focuses on securing, maintaining, and migrating WordPress websites. The website contains information about the causes of hacks, tips for securing WordPress, and a contact form for inquiries. | Web Design → Content Management 293 | hack 36 migration 349 wordpress 3551 security 6655 maintenance 20093 | South-Holland → The Hague 19898 |
| duurzaamdigitaalgroningen.nl | Municipality of Groningen | CyberWijs050 is a monthly campaign organized by the municipality of Groningen focused on promoting digital resilience and safety for citizens. The campaign includes a program of activities, including an opening event with a mindillusionist and the second edition of Hack050, a hackathon. The website provides information about the activities, a program, and the underlying concepts of digital resilience. | Local Government → Municipality of Groningen 16 | digital resilience 13 event 45199 | Netherlands → Groningen 23734 |
| flosecurity.nl | FloSecurity | FloSecurity offers penetration testing services, where an ethical hacker examines a system for vulnerabilities to fix them. The services include monthly security checks to verify that a company is resistant to recent CVEs and safely implemented features. The company emphasizes a proactive approach to cyber security and uses both automated and manual tests to identify vulnerabilities. | | penetration test 17 security 6655 | |
| quality.nl | Quality | The company has extensive experience in areas such as ICT architecture, cloud adoption and integration, and cybersecurity. Quality works at strategic, tactical, and operational levels, analyzing market challenges and providing optimal solutions. The company is a strategic knowledge partner with a proven track record, and boasts specialists in areas such as cloud, cybersecurity, and infrastructure. | IT → Managed Services 720 | cybersecurity 688 networking 842 infrastructure 1460 cloud 1527 architecture 3223 knowledge 3528 | |
| newchannel.nl | NewChannel | NewChannel represents various cybersecurity suppliers and offers EU-based solutions. The website highlights a growing focus on EU cybersecurity due to increasing governmental involvement in data and IT systems worldwide. NewChannel provides a portfolio of innovative solutions and possesses extensive expertise in IT security, cloud applications, reseller and MSP/MSSP services. | Industrial → Industrial Automation 1042 | distributor 232 cybersecurity 688 partner 4272 | Sittard-Geleen → Sittard 1997 |
| cwmaakindustrie.nl | Cyber Resilience Center for the Manufacturing Industry | The number of cyberattacks is increasing, particularly due to the reliance on IT and OT systems in the manufacturing industry. Digital security requires a collaborative approach involving various parties due to dependencies in logistical processes such as lean delivery and JIT. The center offers businesses support, expertise, threat information, and networking opportunities to strengthen their cyber resilience. | Social Organization → Networking Organizations 475 | networking event 61 toolbox 124 cybersecurity 688 | Netherlands → South-Holland 92382 |
| michelbrinkhuis.nl | Michel Brinkhuis | Michel Brinkhuis offers workshops and presentations that make AI accessible and understandable for organizations. The website contains testimonials from various organizations and events where Brinkhuis has delivered his presentations and workshops, with positive feedback. Examples of presentations and workshops include setting up an online company based on ChatGPT and data analysis. | Data Science & Analytics → Artificial Intelligence 1831 | chatgpt 128 evaluation 224 presentation 1785 ai 2181 workshop 19325 | |
| sini.nl | Sini Internet Projecten | The company focuses on a wide range of possibilities regarding the internet and the latest technologies. Services include domain registration, hosting, webshop development, time tracking, search engine optimization (SEO), social media marketing, and SEA advertising. Sini Internet Projecten has been independently active on the internet since 2004 and has the KvK number 37112728 and VAT number NL002091505B57. | Computer Science → Networking 809 | internet of things 18 domain 1811 hosting 3125 seo 3707 | North-Holland → Den Helder 1886 |
| bellehelene.nl | Bellehelene.nl | Articles are presented about the benefits of online marketing, emphasizing cost-effectiveness. The website discusses the importance of linkbuilding in the context of search engine optimization (SEO). Articles address what leadership means and the power of VPNs for secure internet usage. | Advertising → Online Advertising 948 | vpn 167 linkbuilding 473 online marketing 1085 industry 1780 leadership 3724 technology 6816 | |
| antikraakdirect.nl | Anti kraak direct | The website includes various sections such as a news overview, partner listings, interesting links, and blogs. There is a 'Discover' section with Lorem Ipsum, likely a placeholder for future content. Contact information is provided via an email address: info @ domain.nl. | | domain 1811 partner 4272 blog 13392 news 15293 | |
| seccon.nl | Secure Connection | The website highlights the growing prevalence and complexity of cybercrime, emphasizing the need to supplement intuition with data-driven analysis. Secure Connection employs a three-pronged approach to security, encompassing analysis, penetration testing, and network/systems monitoring, utilizing both established and custom-developed tools. The company’s strategy involves real-time network traffic analysis and anomaly detection, aiming to prevent serious security breaches through a combination of signature and behavioral methods. | Security & Surveillance → Security Services 445 | penetration testing 43 monitor 1063 analysis 1615 security 6655 network 11123 | |
| securityadviesgroep.nl | Security Adviesgroep | The company strives to do more than just advise, positioning itself as ‘thinkers who go beyond projects’. The service offering includes various aspects, such as developing vision and policy, guiding procurement processes, compliance audits, and performing security quick scans. Security Adviesgroep considers itself a flexible and dynamic organization that adds value to the client and works with knowledgeable professionals who take into account the customer’s wishes, legal requirements, and safety. | Information Technology → IT Security 980 Government & Administration → Legislation 432 | procurement 493 audit 622 policy 2149 risk 2896 security 6655 | |
| spysecure.nl | SpySecure | The website outlines the problems associated with offering separate cybersecurity services, such as having to independently determine relevant solutions and managing disjointed services without an overview. SpySecure presents the benefits of their all-in-one security package, including clear advice, ongoing monitoring, flexible subscriptions, and support for audits. The website offers different options for potential customers, including direct purchase of packages or guided exploration of their security needs. | | compliance 506 cybersecurity 688 monitor 1063 risk 2896 package 6112 security 6655 | |
| fortigi.nl | Maatschap Fortigi | Maatschap Fortigi is named after Esperanto, the world language, meaning ‘to strengthen each other,’ and their approach is based on mutual support and trust. The partnership was established as a partnership without shareholders, where the members take responsibility for each other and adhere to principles such as pragmatism, lasting value, and transparency. The consultants of Maatschap Fortigi have a proven track record and operate with minimal overhead, ensuring direct engagement with clients and a focus on successful projects. | Information Technology → IT Security 980 | consultant 706 trust 1147 collaboration 16036 | |
| adapting.nl | AdaptingLegal | The website presents various functionalities, including document generation, triage and intake processes, workflow automation, and case management. AdaptingLegal offers an Online Workflow Database with more than 100 legal templates specifically for Dutch law, enabling users to get started quickly. The platform also offers consultancy services and integration options with websites and external applications, and emphasizes secure communication. | Business Software → Document Management 328 | workflow 407 database 1153 integration 1451 document 1678 communication 10162 | |
| camcorderservice.nl | Camcorder Service | The website functions as a blog site that focuses on informing visitors about the latest trends and developments in the social media world. The blog regularly publishes articles on various topics related to marketing, digital strategies, and communication. The platform offers practical tips and advice, such as how to create a CV, improve cybersecurity, and implement effective marketing strategies. | Technology & Digital → Digital Media 23 | cv 516 cybersecurity 688 medium 1293 social media 3342 marketing 7107 blog 13392 | |
| i-respect.nl | i-respect.nl | The website regularly publishes news articles about cybersecurity topics, such as EDR (Endpoint Detection and Response). Attention is paid to secure digital bookkeeping as an essential part of modern business management. The website also addresses the need for penetration testing (pentests) for IT security in the context of increasing cyberattacks. | Administrative Support → Business Operations 1156 | penetration 12 cybersecurity 688 communication 10162 | North-Holland → Amstelveen 3180 |
| wevragenerik.nl | We vragen Erik | Erik Akkermans provides advice, guidance, and reflection, based on his extensive experience in governing and managing art and culture organizations. He is open to smaller board or advisory roles, but currently spends most of his time writing and organizing his archive. His recent publications include the poetry collection 'Hee dat dit dan' from 2024, and he regularly publishes in the series 'In Perspectief' at De Cultuurpers, linking his experiences with current developments. Erik Akkermans has a long career in the art and culture sector, with experience at national, provincial, and local institutions, and was until spring 2022 chairman of Platform ACCT, a platform for improving the cultural labor market. | | governance 610 writing 1504 archive 2067 policy 2149 culture 3922 | North-Holland → Amsterdam 41253 |
| cyberscore.nl | CyberScore | The website describes CyberScore’s services, including risk analyses, penetration testing, and physical security testing, aiming to improve the digital safety of organizations. CyberScore assists organizations with identifying threats, complying with regulations, and increasing the security standard within their organization. The company offers a structured workflow for cybersecurity tests, starting with a technical intake and ending with a report. | Information Technology → IT Security 980 | test 769 scan 790 it 1539 risk 2896 security 6655 | |
| ensured.nl | SSL Certificaten.nl | The Ensured digital signature identifies the sender and prevents unauthorized modification of documents after signing. The PDF signature is standardly trusted by Adobe Reader and complies with international regulations and guidelines, and can be preserved longer with a timestamp. Various subscription options are available, ranging from €175 to €995 per year, depending on the number of documents to be signed and integration with existing systems. | Business Software → Document Management 328 | signature 60 pdf 142 certificate 1036 document 1678 security 6655 | |
| tiensecurity.nl | tien security | The company offers 24/7 managed end-point and email security, with a security operation center and personalized contact. Customers can choose from monthly or annual subscriptions and benefit from a two-week free trial. The registration process is simple: register, onboard (within 10 minutes) and be secured by 24/7 monitoring and advice from the security team. | Finance & Insurance → SMEs 433 | protection 728 monitor 1063 risk 2896 subscription 3287 security 6655 | |
| legaltechmap.nl | Legal Tech Map | The website focuses on various legal technology solutions, including those related to contracts, access to justice, and legal workflow management. Cotembo offers a compliant total solution for onboarding processes, utilizing automated risk scoring and connecting to current law and regulations. Several legal technology providers are showcased, such as TIQ Time (for time tracking), KLEA (for entity management), and LEXGEN AI (for generative AI). | Information Technology → Data Management 827 | workflow 407 compliance 506 ai 2181 contract 2415 | |
| atlantiscybersecurity.nl | Atlantis Cyber Security | The company identifies, detects, responds to, and monitors IoT and OT activity using software and hardware solutions. Atlantis Cyber Security describes itself as a team of international cybersecurity experts focused on innovation and pushing boundaries. Their flagship product, Nautilus, is designed by European cybersecurity experts and industrial processing engineers to ensure data privacy and compliance within the European market. | | ot 10 iot 183 cybersecurity 688 | |
| integripro.nl | Integripro NL | Integripro helps organizations with NIS2, phishing simulations, and information security. The website describes a holistic approach to cybersecurity resilience, based on five key themes that are continuously monitored and improved. This is reinforced by the Continu Cyberweerbaar Zekerheidsplan. Integripro offers audits, training, and a continuous approach to information and cybersecurity, aimed at structurally improving the cybersecurity resilience of organizations and proactively addressing potential threats. | Information Technology → IT Security 980 | nis2 27 phishing 34 information security 217 cybersecurity 688 approach 971 | |
| iden-ai.nl | Iden | Iden employs randomly generated identities with general markers like age, gender, and race to maintain a connection to the user’s physical identity while guaranteeing privacy. Originally resembling dog tags, Iden identifiers, known as ‘tags’, have evolved into diverse shapes and accessories but retain this nickname. The system’s core principle is user control over their online identity, allowing controlled reveals through bidding, and collaborates with authorities to combat crime. | Data Science & Analytics → Artificial Intelligence 1831 | tag 70 crime 148 identity 1028 privacy 1286 | |
| humbird.nl | Energievergelijk | The site facilitates the comparison of insurance policies based on individual preferences and requirements through online platforms. Energievergelijk.nl is considered the best informational website regarding energy, focusing on helping users save on energy costs. The website includes various sites such as AOVzzp.nl, VPN.nl, Creditcard.nl, and Uitvaartverzekering.nl, each offering specific information and comparisons within their respective areas. | Insurance → Comparison 367 | comparison 541 premium 643 provider 1111 insurance 6359 energy 9075 | |
| dmcgroup.nl | DMC Group | The website outlines DMC Group’s services, including advice, support and research, with a focus on enhancing cybersecurity, information security, and privacy protection. DMC Group emphasizes its core values of independence, customer focus, and reliability, and describes its long-term investment in client relationships. The website mentions a project, CLOAK, which is a publicly available knowledge base on cybercriminal concealment techniques. | Information Technology → IT Security 980 | information security 217 cybersecurity 688 research 8967 | Amsterdam → South 1488 |
| cybersecurityketen.nl | Cybersecurityketen | Cybersecurityketen partners with companies and institutions within the ‘Identity Driven Security’ field, facing new challenges due to digital transformation. Legian, an independent ICT knowledge partner since 1996, offers expertise in Cyber Security and related organizational and technical issues. Intermax Cloudsourcing, the most certified managed services company in the Netherlands, provides managed hosting, private clouds, and managed security for organizations prioritizing uptime, security, and compliance. | IT → Managed Services 720 | cybersecurity 688 partnership 1407 cloud 1527 certification 3380 security 6655 | |
| wesecureit.nl | WeSecureIT | WeSecureIT offers a range of services including vulnerability assessments, cybersecurity audits, quick scans, incident response plans, and security awareness training. The organization provides consulting and implements IT security solutions, collaborating closely with the client’s IT department and suppliers. WeSecureIT also offers services such as Cyber Risk and Impact Assessment (Cyber RI&E), privacy consulting, and ISO27001 implementation, and assists organizations in managing cyber risks, including digital emergency assistance. | Insurance & Risk → Risk Management 1060 | vulnerability 149 incident 335 cybersecurity 688 implementation 1029 risk 2896 | |
| sblcybermonitoring.nl | SBL | The website presents a customized cybersecurity solution for SMEs in the manufacturing industry, emphasizing protection against cyber threats. The company offers a free cyber risk assessment and a simulated cyber attack to identify vulnerabilities. SBL provides managed detection & response (MDR) services, continuously monitoring the IT and operational environments and proactively responding to cyberattacks. | Financial Management → SME 161 | response 81 detection 128 cybersecurity 688 monitor 1063 assessment 1205 risk 2896 | |
| isroot.nl | Michael Thelen | The website features a collection of blog posts focused on cybersecurity topics, particularly penetration testing and vulnerability analysis. The posts cover various scenarios and tools, including parsing sign-in logs with Microsoft Sentinel, reviewing Offensive Security courses, and documenting write-ups from platforms like VulnHub and Hack The Box. The blog provides insights into obtaining system and root access on virtual machines and highlights the author's experience in red team penetration testing. | Computer Science → Networking 809 | virtual machine 18 penetration testing 43 vulnerability 149 | |
| clnw.nl | Cloud Networks | The website presents connectivity solutions and cloud solutions. Cloud Networks offers cybersecurity services and managed wifi. The website contains news articles and contact information, emphasizing the delivery of fast and secure networks. | Mobile & Wireless Communication → Network Technology 42 | connectivity 173 cloud solutions 281 cybersecurity 688 network 11123 | |
| b2bsecure.nl | B2B Secure | The website offers a wide range of security services including network security, endpoint security, user security, and data security. B2B Secure focuses on helping companies work securely, regardless of location or the size of their IT infrastructure, offering solutions for both office and home-based work. The website provides assistance in detecting hacking attempts and offering immediate support in the event of a suspected cyberattack. | | it 1539 office 2898 data 5872 security 6655 network 11123 | |
| tokomc.nl | ogma blog | The blog publishes articles about smart marketing strategies for startups, aiming to help them differentiate themselves and grow. The blog also covers cybersecurity for businesses, emphasizing the need to protect data from threats. Furthermore, the blog discusses the benefits of diversity in the workplace and how it can improve organizational performance. | Legal → Legal Issues 56 | diversity 492 cybersecurity 688 marketing 7107 | |
| draads.nl | Draads B.V. | Draads B.V. supports organizations with reliable ICT solutions and carefree workplace management. The website offers various services, including Microsoft 365, VoIP telephony, and cybersecurity solutions. Draads B.V. is registered with the KvK under number 34119015 and has VAT number NL808137529B01 and also offers vacancies and contact information. | IT → Management 346 | voip telephony 30 ransomware 41 workplace management 88 microsoft 365 430 cybersecurity 688 ict 1049 | Utrecht → Montfoort 673 |
| cybercrime-assurantie.nl | Cybercrime Assurantie | The website offers blogs on relevant topics, such as social media strategies and the need for security awareness training. It offers the possibility to have systems checked by experts, emphasizing the benefits of this service. The website publishes free materials and updates on cybercrime and IT security. | IT Security → Business Security 18 | cybercrime 87 publication 2018 security 6655 blog 13392 | |
| ian.nl | Ian van der Wurff | Ian van der Wurff is an ethical hacker based in Curaçao but originally from the Netherlands, offering expertise in hacking and exploit development. The blog features articles covering a wide range of security topics, including CSS timing side-channels, blockchain manipulation, exploit development, malware analysis, and zero-knowledge proofs. Recent blog posts detail exploits for various vulnerabilities, such as CVEs in a router, arbitrary write vulnerabilities, and homoglyph attacks, alongside research on topics like ASLR bypass and delegatecall vulnerabilities. | Software & Computing → Cryptography 13 | hack 36 blockchain 250 research 8967 | |
| rbenw.nl | Multi-disciplinary Knowledge Network for Security | The website presents news articles about topics such as investments by Defense in AI factories, developments in drones and innovations in security technology. The network provides profiles of key individuals involved in security, such as directors of government agencies and police forces, and of experts. The website contains information about events and conferences, such as the CCR Summit 2025, and publishes press releases about appointments and changes within the security sector. | Information Technology → IT Security 980 | defense 121 police 480 ai 2181 innovation 4659 security 6655 technology 6816 | Amsterdam → Nieuw-West 844 |
| cybersecuritysummit.nl | Access42 | The Cybersecurity Summit is a free event taking place on June 19, 2025, at the Prodent Fabriek in Amersfoort. The theme of the 2025 edition is ‘The Perimeter Has Shifted – Cyber Resilience in a Borderless World’ and addresses the shift in security concepts due to increasing remote work and cloud computing. The conference offers plenary sessions, breakout sessions and a keynote talk, and focuses on improving insight into vulnerabilities and limiting risks within organizations. | | vulnerability 149 cybersecurity 688 resilience 1091 speaker 1481 risk 2896 event 45199 | Utrecht → Amersfoort 8011 |
| digiweerbaar.nl | Digiweerbaar | The website offers various services, including education and training to prepare companies for cyber threats, digital security, and penetration testing to identify vulnerabilities. Digiweerbaar focuses on simplifying digital security and offering practical solutions that are easy to implement, without complex jargon. A key service is the provision of MindYourPass, a user-friendly password management solution, and OutKept for continuous monitoring of the digital environment. | Pedagogy & Methods → Digital Education 56 | monitor 1063 consulting 3639 security 6655 training 28133 | |
| dutch-cybersecurity-assembly.nl | Dutch Cybersecurity Assembly | The DCA was founded in 2021 and seeks to improve the cybersecurity and resilience of Dutch companies by collaborating with stakeholders. The website describes the SECURE7 commitment, which requires IT providers to demonstrate their cybersecurity practices. The DCA focuses on the implementation of the NIS2 directive, which will replace the current Wet Beveiliging Netwerk- en Informatiesystemen (Wbni) directive by October 2024, and provides practical solutions through working groups. | IT → Managed Services 720 | nis2 27 working groups 171 cybersecurity 688 | |
| phishify.nl | Phishify | Phishify executes phishing simulations by posing as phishers and sending phishing emails to unsuspecting employees. After a simulation, the organization can gain insight into the number of employees who clicked the link and the percentage who entered their password. Phishify also offers phishing training and can, based on open sources, compile a list of employees and test targeted phishing emails. | Insurance & Risk → Risk Management 1060 | phishing 34 ransomware 41 simulation 241 employee 4429 training 28133 | |
| benikgehacktcheck.nl | Benikgehacktcheck.nl | The website offers a free email check to determine if an email address is involved in a data breach. The article describes the indicators of a possible hack and provides advice on what to do if a hack is detected. The website also publishes recent cybersecurity news and warnings from the NCSC (Netherlands Cybersecurity Unit) about vulnerabilities in various software. | Security → Online Security 45 | hack 36 cybercrime 87 account 5781 data 5872 security 6655 | |
| ospl.nl | OSPL Nederland B.V. | The company specializes in the development and production of rugged and secure equipment compliant with NATO and EU standards. OSPL Nederland B.V. operates a TEMPEST test facility in Eindhoven, Netherlands, adhering to ISO/IEC 17025 standards and specializing in preventing electronic eavesdropping. The production facility is described as secure, modern, and staffed by experienced professionals, capable of handling small to large production batches while maintaining strict quality control. | Technology → Electronics & Components 11261 | facility 2616 certification 3380 equipment 4143 production 4582 | North-Brabant → Eindhoven 11845 |
| cyberinnovationday.nl | Circa Amsterdam | The event will take place on June 5, 2025, at Circa Amsterdam, and will feature discussions around key topics such as security-by-design, investment in cybersecurity innovation, human capital development, and public-private collaboration. Attendees will engage with keynote speakers, panel discussions, and interactive sessions covering various aspects of cybersecurity challenges and solutions. The event aims to strengthen the cybersecurity ecosystem by bringing together innovators, experts, businesses, knowledge institutions, and government officials. | Collaboration & Networking → Networking 1225 | cybersecurity 688 speaker 1481 session 1791 innovation 4659 security 6655 collaboration 16036 | North-Holland → Amsterdam 41253 |
| wallets.nl | Wallets.nl | The website focuses on providing information about hardware wallets, particularly from brands such as Ledger, Trezor and KeepKey, and offers reviews of products like Cryptomaan and SteelDisk. The platform discusses the benefits of using hardware wallets, such as their protection against hackers, encryption, and the ability to create a backup of private keys, which provides extra security and peace of mind. Wallets.nl offers an overview of various cryptocurrencies that can be stored in a hardware wallet and emphasizes the independent nature of the information provided. | Investing → Cryptocurrency 776 | wallet 256 cryptocurrency 367 crypto 384 security 6655 | |
| securepages.nl | SecurePages.nl | SecurePages.nl was created to provide customers with a secure and affordable SSL connection. The platform is a part of PicaSoft.nl and focuses on small businesses. Users can rent a secure page for as little as 15 euros per year, and the difference between a normal page and a secure page lies in the use of the HTTPS protocol and the visible padlock icon in the browser. | Online Marketing → Website Management 369 | ssl 132 bookstore 149 page 427 | |
| 247-ondernemen.nl | 24/7 Ondernemen | The website publishes blog articles on various business topics, including financial advice, career opportunities, digital transformation, and security. Articles cover subjects such as accountants, data analysis, mortgages for freelancers, payment options for restaurants, and ISO 27001 certification. The site also offers news articles and job postings, covering topics ranging from marketing and sustainability to ICT and career guidance. | Real Estate → Enterprises 162 | financial 855 job 2795 data 5872 blog 13392 | Gelderland → Ede 5104 |
| pvo-oostbrabant.nl | Platform Veilig Ondernemen Oost-Brabant | The organization helps businesses, with the help of partners, to create a safe working environment. The website offers news articles about crime, such as burglaries in the countryside and cybercrime, and promotes campaigns to prevent crime. PVO Oost-Brabant works with partners such as the Hackhelpdesk to support businesses with cybercrime and provides an overview of relevant topics and areas. | Associations & Groups → Business Associations 1018 | cybercrime 87 crime 148 partner 4272 safety 5819 news 15293 | North-Brabant → East-Brabant Region 136 |
| impakt-ib.nl | IMPAKT Ingenieursbureau | IMPAKT Ingenieursbureau was established in 2018 as a collaboration between Witteveen+Bos, Royal HaskoningDHV, and Pilz Nederland, and later expanded with Hudson Cybertec. The partners focus on improving the safety and security of infrastructure assets and the automation within them, particularly in collaboration with Rijkswaterstaat. IMPAKT Ingenieursbureau’s expertise encompasses industrial automation, cyber security, functional safety, physical security, and asset management. | Construction → Civil & Infrastructure 3453 | cybersecurity 688 infrastructure 1460 automation 2682 safety 5819 collaboration 16036 | |
| redpack-cybersecurity.nl | RedPack Offensive Cyber Security | The website describes the services offered by RedPack Offensive Cyber Security, including consultancy, penetration testing, Red Teaming, Purple Teaming and Yellow Teaming. It emphasizes the importance of proactive cybersecurity, obtaining accurate information about an organization's security status, and minimizing security risks. The website lists the potential impact of digital vulnerabilities, including unauthorized access, loss of information, extortion, and financial damage. | Insurance & Risk → Risk Management 1060 | penetration testing 43 insight 628 cybersecurity 688 resilience 1091 consultancy 2596 risk 2896 | |
| zeergewild.nl | zeergewild.nl | The website covers the topic of digital security, offering tips on how to protect oneself online from cyber threats, including the use of strong passwords and keeping software up-to-date. Another important section focuses on healthy eating, providing advice on building a balanced diet and its benefits for well-being. The website offers a central location for information and contributes to awareness regarding online safety and healthy eating. | Information Technology → IT Security 980 Security → Authentication 13 | digital security 18 phishing 34 password 213 diet 747 nutrition 4935 | |
| tedangevaare.nl | TAPS – Ted Angevaare Process Security | The website highlights the growing threat of industrial cyberattacks and emphasizes the need for unbiased vendor-independent advice and services. TAPS offers a range of services including training courses, audits and reviews, and consulting, leveraging over 35 years of international experience in the oil and gas industry. The website details different audit and review options, from quick 1-day reviews to comprehensive, tailored assessments, and provides training courses for various roles within operational technology. | Financial Services → Compliance 399 | audits 158 cybersecurity 688 industry 1780 automation 2682 consulting 3639 training 28133 | |
| advocatenraadgevers.nl | Advocaten Raadgevers | The firm offers strategic advice, financial advice, marketing consultancy, and ICT & HR management to law firms. The website highlights the impact of technological innovations, ESG trends, cybersecurity, and compliance on the legal sector and the need for flexible and future-oriented organizations. Advocaten Raadgevers emphasizes the importance of proactive action, anticipating changes, and adapting to thrive in a competitive market. | | operation 480 risk 2896 innovation 4659 technology 6816 strategy 9379 | |
| facilitywereld.nl | Facilitywereld B.V. | The website features blogs covering subjects such as solar energy, cybersecurity, festival makeup, solar energy vs. wind energy, wireless earbuds, and solar energy storage. A key focus is exploring themes of self-sufficiency, including a self-sufficient garden and vegetarian cooking. Visitors are encouraged to subscribe to a newsletter to receive up-to-date information, news, and free insights. | Energy → Renewable Energy 1267 | solar energy 373 cybersecurity 688 newsletter 6504 garden 13129 blog 13392 sustainability 18451 | |
| securitylive.nl | Beveiliging.nl | SecurityLIVE is an annual trade fair and knowledge platform focused on professionals in the security sector, covering topics ranging from intrusion detection to access control and video surveillance. The website provides news, recaps of previous SecurityLIVE fairs, and an overview of knowledge sessions. It also presents recent news about security. The website also includes company presentations and news about solutions and innovations within the security industry, including access control, cybersecurity, and fire safety. | Business & Professional → Trade Shows 951 | access control 350 cybersecurity 688 knowledge 3528 innovation 4659 security 6655 | |
| groupsecure.nl | Group Secure | The company provides practical solutions and targeted advice in areas such as network security, cloud security, endpoint security, and email security, offering assessments and awareness training. Group Secure helps organizations stay ahead of cyber threats through proactive and scalable security solutions that adapt to their needs. The organization provides security solutions for various sectors, including healthcare, government, business, manufacturing, and high-tech, focusing on reliable, scalable, and user-friendly security. | Information Technology → IT Security 980 | cybersecurity 688 security 6655 network 11123 | |
| csi-roggel.nl | Multiplus Online | The website highlights the importance of Security Awareness Training to prevent cyberattacks, noting that technical security measures alone are insufficient. The website's blog section offers updates on technology, media, and personal growth, providing tips and advice. The website also includes information on website creation, online and offline consulting, and links to interesting articles. | Information Technology → IT Security 980 | cyberattacks 17 security 6655 technology 6816 blog 13392 | |
| checkinternet.nl | Online Goed Gevonden | The website covers topics such as boosting productivity with apps, optimizing online visibility with SEO and Google Ads, and designing effective call-to-action designs. It also discusses construction projects and e-commerce SEO, including keyword research, as crucial elements for businesses. The website emphasizes the importance of technology in the modern business world and the role of cybersecurity in protecting digital assets. | Software & Computing → Computing 696 | cybersecurity 688 e-commerce 738 seo 3707 app 4595 marketing 7107 | |
| netstream.nl | NetStream | NetStream has over 20 years of experience designing, implementing, and maintaining cybersecurity and networking solutions, prioritizing customer-specific needs. Research indicates that a significant percentage of organizations, including 68%, have been victims of cyberattacks in the past year, highlighting the need for effective security measures. NetStream offers a wide range of services, from 24/7 detection to incident response and awareness training, aiming to reduce the risk of cyberattacks and integrate with existing business processes. | Information Technology → Network Security 85 | cybersecurity 688 networking 842 risk 2896 security 6655 | |
| visionandrobotics.nl | Vision and Robotics | AI-generated media is seen as a driving force behind various forms of fraud and cybercrime. Recent developments in the Dutch technology industry are highlighted, such as investments from Oracle and the status of women in tech. News articles cover topics such as digitalization, cybersecurity, innovation, and labor market trends. | Data Science & Analytics → Artificial Intelligence 1831 Business → Economy 36666 | startup 376 cybersecurity 688 investment 2070 ai 2181 article 6000 research 8967 | North-Holland → Amsterdam 41253 |
| ivera.nl | Stichting Ivera | The IVERA protocol is developed by road managers and industry to promote standardization of data communication. Stichting Ivera manages and promotes the IVERA protocol and provides license distribution. A review is given of the Cybersecurity Knowledge Café held on September 27, 2023, which took place at the Innovatielab of the ASTRIN Smart Infra Academy in Den Bosch. | | protocol 237 cybersecurity 688 license 1288 foundation 6678 | North-Brabant → 's-Hertogenbosch 8868 |
| veiligheidsdatabase.nl | Veiligheidsdatabase.nl | The website covers topics such as database security, including protecting data from unauthorized access and preventing data breaches. The article discusses the risks of unsecured databases and the need for strong passwords, data masking, firewalls, software updates, and audit trails. The website also includes information on security layers such as authentication, authorization, and encryption, and focuses on the management of external access to databases. | Resources → Databases 348 | attack 31 password 213 database 1153 risk 2896 data 5872 security 6655 | Overijssel → Enschede 5554 |
| gatekeeper.nl | Protected DNS | Protected DNS offers a DNS security solution that directly filters Internet traffic and blocks requests from viruses, malware, and ransomware, even if employees visit infected websites. The DNS system connects Internet-connected devices with each other, translating names into IP addresses. Criminals misuse this system to spread malware. The solution provides reports on Internet misuse and is intended to minimize risks and ensure the continuity of organizations. | Software & Computing → Computing 696 | malware 41 ransomware 41 dns 74 security 6655 | |
| huwatoco.nl | HuWaToCo | The website offers IT consultancy services, including supporting teams with Linux administrators and helping clients successfully complete IT projects. HuWaToCo provides educational programs, such as MBO IT/ICT teachers and opportunities to train employees, as well as lessons about life in the North Sea. The organization also organizes excursions along the beach and offers opportunities to support research projects in nature, including themes around sustainable energy and the Internet of Things. | Vocational Training → MBO 690 | north sea 87 linux 237 it 1539 knowledge 3528 research 8967 education 13471 | |
| frankensecuritysolutions.nl | Franken Security Solutions | The company, established in 2016, offers a wide range of services including consulting, coaching, training, lectures, security audits and integrity management. Franken Security Solutions utilizes 45 years of experience and an extensive network to address complex security issues and guide organizations. The website lists references of various organizations and partners, including government agencies, academic institutions, and security companies. | Insurance & Risk → Risk Management 1060 | fraud 200 integrity 205 risk management 543 consulting 3639 security 6655 training 28133 | |
| zovar.nl | ZOVAR | ZOVAR guarantees the unique identification of insurers and care providers through server certificates. Via server certificates, a secure electronic communication is made possible, which is essential for exchanging information in the healthcare sector. The website offers support to IT providers for installing server certificates and contains information about a test environment, change procedures, and relevant news updates. | Legal & Financial & Career → Health Insurance 519 | changes 326 insurer 446 | |
| otconnect.nl | OTconnect | The company offers a range of solutions, including a baseline security check, training, monitoring, incident response, and risk management, focused on improving the cybersecurity of operational technology. A key concern is the risk that operational systems, such as machines in production facilities connected to the internet, can be hacked, potentially leading to disruption of production processes and danger to people and the environment. OTconnect emphasizes practical training and provides tools and techniques to implement effective cybersecurity in operational technology. | Industry → Industrial 1987 | cybersecurity 688 monitor 1063 risk 2896 training 28133 | |
| jep.nl | Japan Euro Promotions | Established in 1982, JEP has cultivated a broad network of contacts in both Japan and Europe, serving a diverse clientele including hospitality companies, research institutions, and various environmental organizations. The company’s expertise extends beyond business consultancy to encompass media coordination and the planning of cultural and social events, as evidenced by a 2012 delegation visit to the Netherlands to study Dutch horticulture following the 2011 tsunami. A book titled 'Learning the Dutch Way' is available, authored by Takeshi Gotoh and published by Kirara Shobō, which explores the differences in societal approaches and behaviors between the Netherlands and Japan, particularly concerning healthcare and social welfare. | Local History → Dutch History 1067 | medium 1293 healthcare 2316 consultancy 2596 culture 3922 network 11123 event 45199 | North-Holland → Amsterdam 41253 |
| tankalert.nl | SODA | TankAlert provides a method to effectively combat fuel theft without disrupting regular customer service. The platform is based on a protocol approved by the Autoriteit Persoonsgegevens, ensuring a correct operational procedure. TankAlert is developed through a partnership between TankAlert and BigBrother, with BigBrother providing the technical infrastructure and SODA managing the blacklist and collecting outstanding claims. | | license plate recognition 14 collaboration 16036 | |
| mijnsecuritypartner.nl | MijnSecurityPartner | The website provides various audit services, including website audits, network audits, and software audits, to identify potential security risks. It features a knowledge base with FAQs, a blog with tips and information, and announcements such as maintenance notifications and offers. In addition to security services, MijnSecurityPartner also offers hosting and email services, focusing on simplicity and reliability. | Online Marketing → Linkbuilding 214 Information Technology → IT Security 980 | audit 622 security 6655 software 8291 network 11123 | |
| kwa-terugblik-2022.nl | KWA Business Consultants | The year 2022 was characterized by the gas crisis as a result of the war in Ukraine. KWA focused on deploying its specialties in a multidisciplinary way to support the sustainability of clients' operations. The company worked on revising its identity and communicating it anew to improve communication and recruitment. | Business & Industry → Business News 468 | outlook 68 identity 1028 sustainability 18451 | |
| sbbu-uithoorn.nl | Stichting Beveiliging Bedrijven Uithoorn (SBBU) | The Stichting Beveiliging Bedrijven Uithoorn (SBBU) collaborates with the PVO Amsterdam-Amstelland to offer free cyber security advice sessions to entrepreneurs in the region. The website reports on events such as the Day of Safety (October 14, 2021) and the attendance of entrepreneurs and local officials. The 'Oude Dorp' surveillance camera project is nearing completion, and reports of drug trafficking have been received in the Oude Dorp neighborhood. | Technical → Security 408 Business Associations → Foundations 19 | police 480 cybersecurity 688 safety 5819 municipality 6837 event 45199 | Amsterdam → East 1423 |
| shellback.nl | Shellback | Shellback offers a variety of services, including penetration testing, vulnerability scanning, compliance scans, digital forensic investigation, social engineering simulations, and phishing simulations, to protect organizations from cyber threats. The company also provides services for conducting compliance scans and identifying vulnerabilities to meet relevant legal and regulatory requirements. Shellback has a team of security specialists based in Weert, specializing in forensic investigation and tracing the cause of cyber attacks. | Information Technology → IT Security 980 | penetration testing 43 compliance 506 | |
| kolibrie-ict.nl | Kolibrie ICT | The company offers system management with monitoring to keep systems up-to-date and provides software and hardware solutions. Kolibrie ICT provides security solutions for digital workplaces, installation and repair of hardware and software, as well as online backup services. Furthermore, Kolibrie ICT Cloud offers secure and mobile access to data, and focuses on optimizing productivity through workspace management and protection against cyber threats. | IT → System Management 272 | system management 431 backup 494 hardware 941 cloud 1527 security 6655 software 8291 | |
| vandaag-groep.nl | Vandaag Groep | The website offers solutions such as security systems, telephone networks, and fire prevention, specifically tailored to the needs of companies. The focus is on automating business processes, like email traffic, file downloads, and digital collaboration, while maintaining proper security. Vandaag Groep also offers advice and implementation of network solutions, from home offices to company building network security, emphasizing 24/7 availability and reliability. | IT → Network Management 702 | phone 1163 security 6655 network 11123 | |
| ecmsolutions.nl | ECMsolutions | The company offers various services including security awareness training, penetration testing, and simulated phishing tests, focused on protecting organizations from digital threats. ECMsolutions assists organizations with information management, including document management and invoice management, and provides communication solutions such as SMS, Cloud Fax, and EDI. The company has over 25 years of experience supporting organizations in the Benelux region, from SMEs to multinationals, in improving their processes with M-Files, a metadata-driven DMS platform. | Information Technology → Information Management 209 | penetration test 17 information management 144 cybersecurity 688 | |
| theinformalinvestorsnetwork.nl | TIIN Capital | The website provides information about TIIN Capital’s services, including financing for companies in the early and later stages (co) and investments in cybersecurity companies. The platform describes the various funds (such as the Dutch Security TechFund) used for investments, as well as co-investments with partners. The website also includes a step-by-step plan to determine whether TIIN Capital can support the organization and illustrates how investments are made through a video. | Stock Trading → Investing 4298 | ecosystem 262 fund 1063 investment 2070 technology 6816 | |
| abraxax.nl | Abraxax.NL | Abraxax helps organizations map and structure their IT landscape, particularly by setting up CMDBs and managing IT documentation. The services offered include contract management, the creation of SLAs and SLM, and the performance of Business Impact Analyses. Furthermore, Abraxax provides support for ransomware protection and cybersecurity, and the proper tools are secured within the organization. | Legal → Contract Management 73 | sla 22 contract management 210 cybersecurity 688 | |
| think-secure.nl | Think Secure | Think Secure delivers services based on expertise to protect businesses from a wide range of security threats and risks. The company has over 30 years of experience in IT, cyber security, and information security, offering services such as risk assessments, vulnerability testing, and incident response planning. The website emphasizes the importance of up-to-date security information and the use of the latest security standards in today's rapidly evolving technological landscape. | | penetration testing 43 vulnerability 149 audits 158 risk 2896 security 6655 | South-Holland → The Hague 19898 |
| m-aas.nl | Maikel As A Service | Maikel Roolvink has over 15 years of experience in cybersecurity, having worked for various reputable companies such as Tata Steel, Kempen & Co, and SecureLink, and establishing a Security Operations Center. His expertise encompasses Identity & Access Management, information security, and increasing the security maturity of organizations. He further developed within DTX, where he was a Rapid7 partner. The website highlights the strong collaboration that Maikel has with various clients, which has existed for four years and they praise his expertise and reliability. | | cybersecurity 688 security 6655 collaboration 16036 | |
| digitaalwoningdossier.nl | DigitaalWoningdossier | The website warns that the user is on the wrong page and advises contacting the property contact person for the login link. Users must create their profile on a computer or laptop due to the different screen sizes on mobile devices. DigitaalWoningdossier offers a digital vault with encrypted storage and utilizes DigiD security for secure data transmission. | Ministries → Ministry of The Interior 10 | digid 81 profile 1965 data 5872 property 7406 | |
| cloudsecurityblog.nl | erikloef | The attack began with a phishing email prompting recipients to click a link, leading to a fake Microsoft 365 login portal. Hackers used this portal to obtain usernames and passwords, then logged in from Turkey and created forwarding rules to a Gmail address. They leveraged company email conversations to identify key personnel and attempted to initiate fraudulent financial transactions, including transferring funds and leaking sensitive data. | Technical → Security 408 | phishing 34 username 63 outlook 68 password 213 financial statement 321 email 1012 | |
| opensight.nl | OpenSight | OpenSight trains employees, builds processes, and implements technology, such as the Cyber Resilience Platform, to provide effective cybersecurity protection. The service starts with a risk audit to identify vulnerabilities, followed by a collaborative approach to achieve business goals. OpenSight emphasizes the combination of people, processes, and technology to ensure a future-proof digital security. | Information Technology → IT Security 980 | audit 622 risk 2896 security 6655 technology 6816 training 28133 | |
| cognitiveic.nl | CognitiveIC B.V. | The company offers an advanced and automated breach prevention platform called their Offensive Security Platform, which continuously monitors systems and proactively prevents data breaches. CognitiveIC develops 'Hadrian' technology, integrating self-protection and cooperative intelligence to build-in security features. Their offerings encompass memory testing and hardware security solutions, with a focus on ensuring the quality and reliability of memory devices and achieving a zero data protection post-breach (DPPB) level. | | hardware 941 memory 1641 security 6655 technology 6816 | |
| kedalion.nl | Unixerius | Unixerius is a small Dutch consulting firm focused on IT security and infrastructure, characterized by a personalized approach to consulting. The company’s origins trace back to Dick Krijgsman’s desire to support friends and colleagues, leading to the formation of a collaborative team built on trust and shared professional development. Unixerius continues the legacy established by its founder, Dick Krijgsman, with a commitment to providing strong contracts and fostering personal growth among its team members. | | firm 442 infrastructure 1460 contract 2415 consulting 3639 security 6655 | Flevoland → Almere 7765 |
| bwebdevelopment.nl | BWEB | BWEB delivers web design and high-quality web hosting services in Dutch data centers to its clients. The website implements various security measures, including an active firewall, regular scans and SSL connections, to protect user data. BWEB, located in Enschede, is responsible for the processing of personal data and offers a privacy policy. | Legal → Privacy 596 | webhosting 948 center 1115 privacy 1286 webdesign 4092 data 5872 security 6655 | Overijssel → Enschede 5554 |
| sbd-research.nl | Security By Design (SBD) | The SBD team is part of the Complex Cyber Infrastructure (CCI) group and investigates side-channel attacks and the efficient implementation of security primitives. They develop secure implementations of hardware, software, and co-designed systems, as well as tools for automating secure system construction and verification. The Advanced School for Computing and Imaging (ASCI) offers a course on embedded and cyber-physical systems security, providing hands-on exercises for students. | Technical → Security 408 | cryptography 31 verification 40 hardware 941 security 6655 course 14728 | North-Holland → Amsterdam 41253 |
| checksecurity.nl | Check Security | The website focuses on collaborating with educational institutions and developing customized security solutions. Check Security emphasizes their expertise in education, their knowledge of the market, and their commitment to providing secure education. One of the offered services is a ‘Security Check’ based on the latest framework, where current security measures are evaluated and adapted to the most recent threats. | Technology & IT → Educational Technology 380 | framework 283 cybersecurity 688 environment 4873 education 13471 | |
| cyberspark.nl | CyberSpark | The post details the steps involved in identifying and exploiting an XSS vulnerability within an application, specifically referencing an XSS cookbook containing multiple payloads. The author, CyberSpark, examines the application's source code, noting the inclusion of three scripts: a main script, a jQuery-deparam library, and Google Analytics. The challenge involves finding an XSS vulnerability somewhere within the application based on the provided cookbook. | Web Technologies & Services → Web Development 2488 | vulnerability 149 cookbook 260 script 532 | |
| allthingscloud.nl | AllThingsCloud | The website describes the concept of a modern workplace, emphasizing safety, continuous updates, and accessibility for employees through cloud solutions such as Microsoft Intune and Azure Active Directory. The website highlights the increasing threat of ransomware attacks and the importance of cybersecurity, specifically advocating for a ‘zero trust’ strategy. The website offers services, including security assessments, roadmap development, and assistance with preparing for a migration to a cloud-based working environment. | Real Estate → Enterprises 162 | roadmap 125 cloud solutions 281 | |
| onderwijsictsecurityscan.nl | Onderwijs ICT Security Scan | The website highlights the increasing complexity of hybrid learning and working for educational institutions and the associated IT security challenges. The website describes the consequences of cyberattacks on educational institutions, such as reputational damage and financial loss, and advocates for immediate action. The website introduces the ‘ICT Security Scan’ as a tool for schools to quickly gain insight into cybersecurity risks, with attention to Microsoft and Azure environments and the maturity of security measures. | Information Technology → IT Security 980 | cybercrime 87 microsoft 183 scan 790 risk 2896 data 5872 | |
| volvox.nl | Volvox | Volvox operates using a ‘koetshuis’ approach, meaning they temporarily join the client and do not remain longer than necessary. The agency offers services in the areas of project management, interim management, and ICT management, focusing on optimizing organizational and ICT processes. Volvox has successfully completed projects such as the implementation of Open Zorg, system development, risk analysis, and awareness programs on the topic of information security. | Information Technology → IT Security 980 | ict 1049 risk 2896 security 6655 | |
| cyberthreat.nl | cyberthreat bv | The company provides cyber threat intelligence consulting services to both new teams and those facing specific challenges. Cyberthreat offers advanced indicators to improve network security and threat intelligence tools for its clients. Data is provided through a flexible API and caters to MSSPs and security product providers, aiming to increase client security. | Information Technology → IT Security 980 | indicator 58 api 276 data 5872 | |
| actabyte.nl | Actabyte | The company offers a hassle-free IT experience for a fixed monthly fee, including support, cybersecurity, proactive management, and assistance. Actabyte focuses on understanding client IT needs and delivering the appropriate solutions, such as software implementation and network infrastructure management. The website offers various services, including Microsoft 365 business voice, Xelion Managed voice, mobile telephony, cloud solutions, and cybersecurity. | IT → Managed Services 720 | cybersecurity 688 cloud 1527 it 1539 | |
| werkenbijricoh.nl | Ricoh | Ricoh offers organizations and businesses support in digital transformation and the implementation of hybrid working, helping to modernize the Netherlands. The website describes the employment conditions at Ricoh, such as the ability to manage one's own growth, the provision of development opportunities and a good work-life balance. Ricoh has a long history (85 years) in driving change and is active in various departments, including Supply Chain Management and International. | HR Services → Job Board 280 | hybrid work 35 it infrastructure 84 digital transformation 215 job vacancies 1241 sustainability 18451 | North-Brabant → Bergen op Zoom 2274 |
| inventix.nl | InventiX | The website offers various services, including cybersecurity for websites and webshops, WordPress and WooCommerce maintenance & security, and website recovery after hacking. InventiX provides specialist cyber solutions for individuals, businesses, freelancers, and webshop owners, with nearly two decades of experience and a large number of satisfied customers. The services encompass advice, securing digital environments, and protecting against digital threats, with a focus on the safety of customer data and underlying systems. | Management → IT Strategy 185 | cybersecurity 688 data 5872 security 6655 | |
| lapisit.nl | Lapis IT BV | The website covers topics such as website maintenance, webshop management, PC support, online security, patch management, antivirus software, backup and recovery, relationship management, and functionality. Lapis IT BV positions itself as a Managed Service Provider (MSP) that provides 24/7 network, application, infrastructure, and security services through active management and regular support. The website offers specific services including Online Protection Plans, Office 365, and Internet Telephony (VOIP), with a focus on minimizing downtime and providing a secure and efficient IT environment. | IT → Managed Services 720 | office 365 135 security 6655 network 11123 | |
| seebus.nl | Seebus Special Projects | The company assists businesses and government agencies with issues concerning confidential documents, safety regulations, counterfeit products, and verifying the identity of employees. Services include brand protection, fraud prevention, document security, biometric access control, digital identity systems, and e-learning for document verification. Seebus Special Projects collaborates with various companies and offers diverse products, including secure banknotes, weapon detection software, and digital identity solutions. | Information Technology → IT Security 980 Insurance & Risk → Risk Management 1060 | biometrics 11 protection 728 identity 1028 risk 2896 security 6655 | |
| sblcybersecurity.nl | SBL Cyber Security | The company focuses on offering cybersecurity solutions to small and medium-sized businesses (SMEs), often making it more cost-effective to utilize external expertise than to have a full-time CISO. SBL Cyber Security provides services such as penetration testing, cybersecurity assessments, ISO27001 certification, security monitoring, and file audits, and offers solutions for data insight and access monitoring compliant with GDPR. The website presents various possibilities, including the implementation of solutions for data breach detection and offering demonstrations to potential clients. | Insurance & Risk → Risk Management 1060 | penetration test 17 iso27001 22 file 445 cybersecurity 688 assessment 1205 | |
| industrielenetwerkoplossing.nl | MODELEC | The website describes the benefits of secure industrial networks, specifically focused on Operational Technology (OT) networks. It emphasizes the risk of outdated Ethernet switches, which are vulnerable to cyberattacks and functionality problems, potentially impacting safety and reputation. The website promotes a secure and reliable OT network solution and provides information on replacing old switches and preventing downtime. | Industrial → Industrial Automation 1042 | ot 10 switch 140 risk 2896 security 6655 network 11123 | |
| itconnectie.nl | IT-Connectie | Since 2002, IT-Connectie has offered a wide range of IT services, from advice and delivery to support. The website provides services such as network management, system management, and workplace management, as well as a security office and customer stories. IT-Connectie emphasizes the reliability of its services, with a team of trained and certified IT professionals, and a focus on customer satisfaction. | IT → System Management 272 | network management 235 cloud solutions 281 system management 431 cybersecurity 688 | |
| atelier-telgenhof.nl | XEvil | XEvil 5.0 is a CAPTCHA killer that automatically solves a wide range of CAPTCHAs, including ReCaptcha v.2, ReCaptcha v.3, and CAPTCHAs from various popular services such as Google, BitcoinFaucet, and Steam. The program offers multiple API integrations (2Captcha, anti-captcha, etc.) and is suitable for various applications such as SEO, SMM, password recovery, and cryptocurrency mining. Users can purchase a license for $59 USD and benefit from free support, technical documentation, and the ability to train XEvil for their specific CAPTCHA types. | Automation & Control → Automation 1494 | api 276 license 1288 software 8291 | |
| smartconsult.nl | SmartConsult | The company offers services such as general management, interim management, crisis management, and project management. SmartConsult specifically focuses on providing expertise when companies lack time to make strategic adjustments or require specialized knowledge, such as smartcard technology. The company recently assisted a large educational institution with the implementation of a new chip card system. | Information Technology → IT Security 980 | consulting 3639 technology 6816 | |
| evonex.nl | Evonex | The website presents various solutions within the categories of Connectivity (business internet, mobile, telephony) and Network and Infrastructure (managed WIFI). Within Managed Workplaces, services are offered such as secure managed workstations, backup and recovery, Microsoft 365, Mobile Device Management, and printing and document management. Cybersecurity-related services are also offered, including ISO 27001 compliance, NIS2 legislation, training, and monitoring. Evonex also offers consultancy, interim solutions, and project management. | Technology → ICT Solutions 10 | connectivity 173 cybersecurity 688 ict 1049 security 6655 | |
| data4.nl | Data4 | Data4 offers cybersecurity services, including 24/7 incident response and cyber security services. The company provides a wide range of IT management services, such as modern workplace management, application packaging, cloud & infrastructure management, and servicedesk support. Data4 also offers staffing services and consultancy, and focuses on creating a future-proof IT environment that enables employees to work more productively. | | it management 150 cybersecurity 688 employee 4429 data 5872 network 11123 | |
| corporatevision.nl | Corporate Vision | The company offers project and program management services, focusing on overseeing projects and efficiently deploying teams to support the company’s strategy. The website highlights that experienced project managers ensure a high success rate (70%) for projects and describes the essential elements for successful projects, including clear requirements, good planning, and risk management. Corporate Vision also offers website design, development, and maintenance services, with a focus on transparency and a personalized approach. | Financial Services → Compliance 399 | value 1352 risk 2896 project management 3423 | |
| cocomohosting.nl | Cocomohosting | The website offers various web hosting options, including fast and reliable packages, and support for WordPress and Drupal. Users can easily register domain names from a wide range of extensions and build a website using the website builder without programming knowledge. Cocomohosting offers a 30-day money-back guarantee for dissatisfied customers and provides various domain extensions with corresponding prices. | Legal → Privacy 596 | toolkit 157 email 1012 domain 1811 hosting 3125 | |
| ssc-ictspecials.nl | SSC-ICT | The magazine includes updates on projects and events within SSC-ICT, such as the clearing of old email domains and the rollout of the Digital Work Environment Rijk (DWR 2.0). Articles address the need for cybersecurity resilience, SSC-ICT and the IND's approach to clearing domains, and collaboration towards a secure future. Discussions with SSC-ICT leaders highlight the challenges posed by political and technological developments and the focus on secure cloud-managed environments. | Government & Administration → Government Organizations 1002 | domain 1811 security 6655 technology 6816 strategy 9379 | |
| beste-alarmsysteem.nl | News Platform | The website publishes news about the decline of burglaries in the Netherlands. A report is made of a stabbing incident at an asylum center (AZC) in Budel, where the police are conducting an investigation. The website addresses improvements in security measures at an institution (CTP Veldzicht) and a case of stolen police uniforms. | Crime & Safety → Crime 356 Information Technology → IT Security 980 | cybercrime 87 burglary 211 alarm 377 police 480 | Cranendonck → Budel 385 |
| sds-ict.nl | SDS ICT | The website describes a wide range of services including cybersecurity, network management, cloud security, computer support, training, and support. SDS ICT offers solutions for Managed Security Monitoring, Network Security, Camera Security, Managed UniFi Network, Cloud Email Security, Endpoint Protection, and Ubiquity UniFi Protect. The website emphasizes the importance of prevention in cybersecurity and provides services for system monitoring, server management, VoIP telephony, log data analysis, and vulnerability detection. | IT → Network Management 702 | cybersecurity 688 security 6655 network 11123 training 28133 | |
| ferm-zeehavens.nl | Ferm Zeehavens | Ferm is a collaborative entity that was established through a joint effort between Stichting Ferm, the Association of Port Organizations (BOZ), the Ministry of Infrastructure and Water Management (I&W), and the National Cyber and Infrastructure Security Agency (NCTV) to address cyber threats in the ports. The organization focuses on three key roles: providing direction, advocating for the interests of the ports, and connecting relevant parties to respond collectively to threats. Ferm works to improve the digital resilience and robustness of the five ports by sharing knowledge about crucial chains and risks, and by defending the interests of the ports before various agencies. | Marine & Shipping → Ports 32 | chain 313 port 324 cybersecurity 688 resilience 1091 risk 2896 collaboration 16036 | Amsterdam → Westpoort 54 |
| ateliergr.nl | StyleDesign College | The website covers topics such as data analysis in platforms like Inception and HBO Max, and the possibilities of interpreting and analyzing this data. An introduction is given to the world of travel-scented candles, which promise a journey through exotic locations, and about the benefits of using VPNs to access Netflix content. The website provides information about the need for SSL certificates for online stores, especially in the electronics sector, and the role of suitable footwear during training with a trainer. | Computer Science → Networking 809 | vpn 167 perfume 534 shoes 2699 data 5872 shop 6483 | |
| absign.nl | AbSign | AbSign provides digital signatures that allow customers and partners to quickly and securely sign documents from anywhere, which are valid in the EU, the US, and Latin America. The company integrates digital signatures seamlessly into existing systems via an API connector and offers a pay-as-you-go model for its services. With over 10 years of experience, AbSign works with companies, organizations, and governments worldwide and contributes to sustainable development goals. | Online & Digital → Digital Services 1008 | digital signature 10 document 1678 | |
| onlinemarketing24.nl | Onlinemarketing24 | The website provides customized solutions for various online objectives, including SEO marketing and social media strategies. Gezondheid24 is an online magazine that publishes articles on health, lifestyle, nutrition, and sports, with the goal of encouraging people to live a healthier life. The website is built with WordPress and linked to other websites via links. | Periodical Publications → Magazines 1001 | cloud 1527 presentation 1785 magazine 2182 seo 3707 marketing 7107 | |
| fitsecure.nl | Fit Secure | Fit Secure profiles itself as a Managed Security Service Provider (MSSP), a reliable and secure ICT service provider for SMEs. The website offers high-quality ICT services and products, including Cloud, Security, ICT Sanity and ICT managed services, and advises clients on the best solutions. Fit Secure aims to create a healthy, secure, and efficient ICT environment for clients, with fair, reliable, and no-nonsense security solutions and integrated ICT services. | IT → Management 346 | ict 1049 security 6655 | |
| sobatkrasservices.nl | Sobat Kras | The website provides advice and support for improving website visibility through search engines like Google. Sobat Kras advises and helps with ensuring the security of websites against online attacks and vulnerabilities. The website contains blogs, how-to's, and tips on optimizing websites and checking for security. | Web Design → Optimization 99 | business profile 14 website security 43 search results 106 security 6655 | |
| frameid.nl | De Onzichtbare Bescherming | Frame-ID is an identification system that installs a unique module into the bicycle frame, this module contains an identification code and is registered in a secure database. The system offers benefits for both public and private parties, such as reducing bicycle theft, providing simple property verification and ease of use with smartphones. The module is discreet, weatherproof, and compatible with various bicycle types, and also provides support to law enforcement and increased insurance coverage. | Bicycles & Wheels → Bicycles 1466 | module 971 database 1153 smartphone 1344 bicycle 2838 security 6655 | |
| 123cybersecurity.nl | 123CYBERSECURITY.NL | The website covers topics such as cybersecurity, information security, cybercrime, identity theft, phishing, and ransomware. It offers helpful tips and advice on how to work safely online, including the use of antivirus apps and VPNs. The website also provides an overview of the ‘11 golden rules’ for safe internet use, prepared in collaboration with the National Cyber Security Centre (NCSC). | Information Technology → IT Security 980 | phishing 34 ransomware 41 antivirus 74 vpn 167 information security 217 cybersecurity 688 | |
| agilesecurity.nl | 1Secure | The company develops Octoprobe light, a self-learning system designed to detect malware infections in IoT and SCADA/ISC networks, with funding from the SNN and EFRO. 1Secure offers Risk Management Support, including a training program called 'Protecting by Breaching' to help organizations assess and manage risks efficiently. Their services cover a wide range of sectors including banking, healthcare, insurance, government, and retail, focusing on tailored solutions and expert consulting to improve operational efficiency and ensure quality. | Information Technology → IT Security 980 | malware 41 assessment 1205 risk 2896 training 28133 | |
| bedrijfspromoties.nl | MyQRLWallet | MyQRLWallet is presented as the world's first quantum-resistant cryptocurrency wallet, offering both web and mobile platforms with enhanced security. The wallet's core functionality includes sending and receiving QRL, managing multiple wallets, and effortlessly creating and managing tokens, notably the QRL Zond platform. QRL Zond, a post-quantum clone of Ethereum, utilizes Dilithium keys and XMSS encryption to deliver secure smart contract functionality, alongside features such as multi-language support, custom nodes, and real-time alerts. | Investing → Cryptocurrency 776 | token 24 wallet 256 security 6655 | |
| cmsjoy.nl | CMSJoy | CMSJoy offers services for creating new websites, redesigning existing sites, and securing WordPress and Joomla sites. The company aims to allow clients to focus on their website without worrying about its maintenance. CMSJoy provides various add-ons, including backups, security, and technical support, such as search engine optimization, recovery from hacks, and migration to a different provider. | Online Marketing → Website Management 369 | joomla 171 backup 494 wordpress 3551 security 6655 maintenance 20093 | |
| domeinbehoud.nl | N.V. Domeinbehoud | The website advises celebrating when a domain name is acquired, merged, or a new website is launched. It suggests that domain administrators should request 10 euros per year from their boss to prevent serious data breaches. If the boss doesn't have a budget, it recommends paying from their own pocket. If alternative hosting isn't available, specialized companies like Freedom Internet, TransIP, Logius, SURF and VECOZO are mentioned. | Legal → Privacy 596 | data breaches 14 budget 1335 domain 1811 hosting 3125 | |
| indehuidvaneenhacker.nl | In the huid van a Hacker | The website offers a workshop for primary education students, aimed at making them aware of the risks and benefits of internet usage, where they practice cracking passwords. Furthermore, the website provides network monitoring solutions specifically targeted at detecting and preventing misuse of networks by analyzing traffic and comparing it to online databases. The trainers of the organization have extensive experience in education and can tailor the training to the specific needs of businesses. | Insurance & Risk → Risk Management 1060 | password 213 trainer 1966 security 6655 network 11123 workshop 19325 | |
| ztegeman.nl | Ztegeman | The author is currently dealing with a significant amount of spam emails using their domain name as the sender. These spam emails originate from various locations around the world, including Tunisia, Brazil, Iraq, India, and Vietnam, often containing malicious links or attachments. The author has implemented an SPF record change to attempt to reduce the number of spam emails received, preventing them from being accepted by mail servers. | Services → Email 161 | spf 14 spam 34 attachment 208 email 1012 domain 1811 computer 1969 | |
| detoekomstisvandaag.nl | Cisco | The website describes Cisco’s approach to furnishing smart buildings in the Netherlands, with a focus on efficiency, safety, and collaboration. Cisco offers digital solutions that contribute to creating an intelligent work environment where employees can work together effectively. The website emphasizes the importance of cybersecurity and introduces Cisco’s security products as a way to maintain control and minimize risks. | Digital Media & Design → Digital Transformation 954 | building 3204 security 6655 technology 6816 collaboration 16036 | |
| sintra-ai.nl | SINTRA-AI | SINTRA aims to address disruptions caused by various safety and security threats impacting critical industrial and civil infrastructure, such as airports and power plants. The platform utilizes multi-modal sensing and AI-powered data analysis to provide a comprehensive view of infrastructure safety and security, detecting complex anomalies. The project involves testing innovations at various locations, including the port of Moerdijk, and seeks to identify new test locations that can contribute specific scenarios and infrastructure. | Artificial Intelligence → Machine Learning 102 | senses 133 infrastructure 1460 partner 4272 | North-Brabant → Eindhoven 11845 |
| plotsandplans.nl | Plots&Plans B.V. | The company offers services in the areas of ICT connectivity, privacy, information security, and security for SMEs. The services include support for the implementation of standards such as ISO 27001, NEN 7510, and GDPR, privacy coaching for employees, internal audits, and the use of Normity. Plots&Plans also offers services such as zero measurements (current situation mapping), on-demand privacy support (assistance with a Privacy Officer), and provides contact details for further inquiries. | Information Technology → IT Security 980 Legal → Privacy 596 | iso27001 22 gdpr 179 audit 622 implementation 1029 ict 1049 privacy 1286 | |
| jouwmkbdesk.nl | Jouw MKB Desk | The website features a knowledge bank with articles on various subjects, including leadership styles, liquidity, salary increases, NFTs, and cybersecurity. Articles are published by Jonathan van den Broek and the editorial team, addressing topics like the impact of career on health and the necessity of cybersecurity for SMEs. The website also offers a selection of recommended articles with publication dates and author details. | Administrative Support → Business Operations 1156 | nft 50 liquidity 68 knowledge bank 99 cybersecurity 688 career 2513 | |
| xmon.nl | XMON | The company’s approach centers on understanding how attackers operate ("Own the offense") to build a robust defense strategy. They offer engaging presentations and hands-on training to equip teams with the necessary skills to protect their systems. XMON’s services encompass proactive threat anticipation, ethical hacking practices, and continuous learning to adapt to evolving cybersecurity challenges. They also provide security advice and intel. XMON is a company based in Utrecht, Netherlands, offering a range of cybersecurity solutions and emphasizing a commitment to building a safer digital environment. | | threat 62 intelligence 81 defense 121 cybersecurity 688 innovation 4659 training 28133 | Netherlands → Utrecht 48901 |
| naala.nl | NAALA | NAALA specializes in assisting companies with regulatory compliance related to medical devices (MDR, IVDR), data protection (GDPR), and information security (ISO 27001, NEN 7510). The company offers services like navigating European quality regulations for AI and Medical Devices, obtaining CE-marking, and implementing data protection strategies aligned with client goals. NAALA’s core philosophy is to act as a ‘trusted advisor’ for businesses facing complex compliance challenges, focusing on safeguarding products through expertise in quality, privacy, and security. | Privacy → Data Protection 224 | data protection 30 medical device 57 information security 217 compliance 506 privacy 1286 | |
| otvandaalen.nl | Ot van Daalen | He specializes in areas such as designing privacy-friendly systems, evaluating surveillance regulations, reviewing export controls for quantum computers, and assessing mandatory encryption backdoors. The website includes posts on topics like software obstacles preventing phone repairs and the implications of bike bankruptcies. Root Legal, a law firm associated with van Daalen, offers legal support to companies, organizations, and citizens. | Business Law → Corporate Law 833 | law firm 585 cybersecurity 688 privacy 1286 ai 2181 book 11396 | |
| deepbluesecurity.nl | DeepBlue Security & Intelligence | The website outlines various cybersecurity services, including penetration testing, security team as a service, Managed SOC, Incident response and VPN detection. DeepBlue Security & Intelligence describes itself as recognized cybersecurity specialists with a CCV Penetration Test Certificate, with an experienced team providing high-quality and professional services. The website highlights the transparency and trust in client collaboration, and the extensive experience of the specialists, particularly in the government sector. | Healthcare & Medical → Information Systems 52 | incident response 15 penetration testing 43 cybersecurity 688 collaboration 16036 | |
| data4cybersecurity.nl | Data4 Cybersecurity | Data4 Cybersecurity offers various services including pre-NIS2 assessments, security operations centers (SOC), penetration testing, incident response, and cyber insurance. The company consists of a team of specialists dedicated to providing high-quality cybersecurity solutions and advice. The website also informs about current cyber threats and offers security awareness training. | | soc 10 incident response 15 penetration test 17 cybersecurity 688 security 6655 | |
| socured.nl | Socured | Socured identifies vulnerabilities in an organization in three steps: research, optimization, and continuity. The services offered include physical security, cybersecurity, managed services, endpoint protection, firewalls, network segmentation, and more. Socured also provides offensive security services such as audits, phishing tests, and penetration tests. | Insurance & Risk → Risk Management 1060 | continuity 128 optimization 611 cybersecurity 688 security 6655 research 8967 | North-Holland → Amsterdam 41253 |
| beeable.nl | Bee Able | The website offers explanations of information security and privacy, accessible to a broad audience. Bee Able provides services within both IT (IT) and Operational Technology (OT) domains, guiding organizations step-by-step towards a future-proof and more resilient position. Services include analyses, implementation of standards (BIO, ISO 27001, NEN 7510), maintenance, improvement and audits, with attention to relevant regulations such as ISO 27001, ISAE 3400/3402, SOC 1/2 and the NIS2 directive. It also offers a 'Professionals as a Service' option. | Privacy → Data Protection 224 | standards 394 cybersecurity 688 regulation 1350 ai 2181 | |
| timvandeursen.nl | Hack the Planet | Tim van Deursen founded Hack the Planet in 2016, driven by his passion for tackling societal challenges with creative and innovative technological solutions. Hack the Planet, in collaboration with Q42, develops impactful projects with a team of over 100 engineers and leverages advanced technology and expertise. Tim van Deursen combines technical expertise with a strong focus on sustainability and works with Q42 to realize ambitious projects that make a difference worldwide. | | technology 6816 sustainability 18451 | South-Holland → The Hague 19898 |
| tams-consultancy.nl | Tams Consultancy | The website outlines Tams Consultancy's services, including support for scale-ups, supervisory roles, interim management, and development of quality and compliance roadmaps. The consultancy specializes in assisting companies operating within industries like medical devices, life sciences, and pharmaceuticals, emphasizing the importance of meeting current and future regulations and industry scrutiny. Tams Consultancy's expertise extends to various regulatory frameworks and standards, including ISO certifications and compliance guidelines for different regions. | Business → Industry 36977 | scale-ups 27 roadmap 125 compliance 506 regulation 1350 consultancy 2596 | |
| shorewatcher.nl | Shorewatcher | The website includes a blog section where the author posts miscellaneous content, including 'funny things'. It features writeups of HackTheBox machines, specifically ‘UnderPass’ and ‘Cap’, emphasizing the lack of guidance provided during these exercises, which is suited for testing skills. The website also includes a guestbook for visitors to leave comments and suggestions. | Information Technology → IT Security 980 | cybersecurity 688 machine 3727 blog 13392 | |
| villastraylight.nl | Arena for Journalism in Europe's Collaborative Desk | The site details Deborah’s background as a security awareness trainer, project manager, and IT coordinator, highlighting her 20+ years of experience in digital rights and information security. She currently works for Arena for Journalism in Europe's Collaborative Desk, utilizing her skills in IT coordination and security awareness training. Beyond her professional work, Deborah is also a ceramist specializing in hand-building techniques, particularly Raku firing, and creates a series of ‘Face Vases’. | Crafts → Ceramics 1156 | raku 44 information security 217 ceramics 1271 security 6655 music 13170 training 28133 | North-Holland → Amsterdam 41253 |
| jeroen-vink.nl | Jeroen Vink | The website provides an overview of the latest news, including articles about floods in the US, a court case in the Waddenzee (Wadden Sea), conflicts in Thailand and Ukrainian protests. A key component of the site is an explanation of network protocols, with the definition of a network protocol and the ability to compare protocols using texts and videos. The site reports on various events, such as aggressive bees on Curaçao and the evacuation of people in the border area of Thailand and Cambodia. | Technical → Technical Information 23 | boy 118 protocol 237 video 6714 network 11123 news 15293 | |
| huijbregtsgroep.nl | Huijbregts Groep | The company inventories, designs, secures, and manages the complete ICT infrastructure of companies, with a focus on customized solutions. They offer solutions for various needs, including enterprise solutions for SMEs, internet & telephony, and modern workplaces. The website also provides training on cybersecurity and an all-in service for securing systems against cyber threats. | IT Security → Business Security 18 Technology → IT 3337 | cybersecurity 688 ict 1049 infrastructure 1460 security 6655 | |
| mathay.nl | Mathay Kahraman | The blog features walkthroughs of HackTheBox machines, including the 'PC' box (June 23, 2023) and the 'Passage' box (October 8, 2020). It also includes a write-up for the 'blunder' HackTheBox machine (September 21, 2020), detailing the engineer's approach and learnings. Mathay Kahraman, a Cyber Engineer at Thales Netherlands, shares his experiences and knowledge related to cybersecurity, highlighting his education at the University of Twente and current location in Huizen. | Social → Personal Blog 2718 | cybersecurity 688 netherlands 1376 | |
| p0wnparty.nl | Mendix | The Mendix CTF 2024 was a cybersecurity competition focused on breaking Mendix applications, attracting enthusiastic participants and generating memorable moments. The website showcases event highlights, including videos of the kickoff, award ceremony, and challenges, alongside a leaderboard of the top 25 teams who participated. Resources are also provided, such as beginner tips & tricks for hacking Mendix applications and securing development practices within the Mendix platform. | Software Development & Engineering → Low-Code Development 59 | ctf 10 mendix 34 challenge 1697 security 6655 video 6714 | |
| ecovolve.nl | EcoVolve | Transforming an organization into sustainable business is a complex challenge that requires willing decision-makers, integration into business processes, and collaboration. EcoVolve ensures that sustainability plays a central role within an organization, accelerates sustainable projects, and prepares the organization for the future. EcoVolve offers services such as guidance for B Corp certification, the creation of a sustainable roadmap, and the activation of a sustainable mindset. | Software Development & Engineering → Agile Methodologies 210 | roadmap 125 mindset 782 certification 3380 sustainability 18451 | |
| wordpresskwetsbaarheden.nl | wordpresskwetsbaarheden.nl | The website collects and publishes news about WordPress vulnerabilities, hacks, and security issues. Since 2021, a record has been kept of publications about vulnerabilities in WordPress, themes, and plugins. Despite the inherent security of WordPress, themes and plugins are often a source of vulnerabilities that can be exploited by hackers. | Web Development → Content Management Systems 502 | vulnerability 149 plugin 203 wordpress 3551 theme 4015 security 6655 | |
| myitcrew.nl | My IT Crew | The website addresses various IT issues such as falling behind with digitalization, the lack of an IT strategy, and high IT costs. My IT Crew offers a wide range of services, including Managed IT services, IT management outsourcing, desktop management, server management and cybersecurity solutions. The website provides explanations of important IT concepts such as cloud computing, cybersecurity, disaster recovery and remote access, referencing experts within the organization. | IT → Network Management 702 | managed services 95 it management 150 cybersecurity 688 digitalization 757 cloud 1527 | |
| cyberlab.nl | Cyberlab | The website offers various services including defensive measures, attack simulations, and emergency assistance in case of cyberattacks. Cyberlab emphasizes prevention and preparation for cyberattacks, aiming to enable organizations to transform threats into control. The website also contains information about the technologies used, employee benefits, reference listings, customer cases, and relevant resources such as a blog, webinars, and a newsletter. | Insurance & Risk → Risk Management 1060 | soc 10 pentest 17 threat 62 cybersecurity 688 | |
| leerbedrijfdigitaliseringenveiligheid.nl | Digitalization and Safety - Learning Company | The learning company was established to provide students with valuable work experience, specifically in the area of digitalization and safety. A key part of the offering is cyber crisis simulation, utilizing a high-tech crisis simulation room in Leeuwarden. The company promotes the creativity and fresh perspective of young professionals to deliver practical solutions in an increasingly digital world. | Special Needs & Support → Practical Education 20 | digitalization 757 safety 5819 student 7623 | Friesland → Leeuwarden 6068 |
| bitict.nl | BIT ICT | The company offers reliable, secure, and flexible IT solutions, including workplace management and cybersecurity. BIT ICT optimizes the IT environment of businesses to ensure smooth operation, focusing on providing opportunities rather than concerns. The services include managed workstations, server management, network management, and support, aiming to support and strengthen businesses. | Information Technology → Business IT 102 | server 1036 workplace 1046 it 1539 security 6655 network 11123 | |
| digitalradicals.nl | Digital Radicals | The website offers an overview of vacancies within various MarTech subfields such as Digital, IT/Tech, E-commerce, and Marketing. Digital Radicals describes their approach as building teams and careers in the MarTech sector, looking beyond a traditional CV. The website emphasizes a culture of openness, honesty, and directness, aiming to quickly find the right match for both full-time and freelance positions. | | match 3471 culture 3922 vacancy 6598 | |
| pampuna.nl | Pampuna | The site primarily features articles and proof-of-concept exploits created by Rutger, a security researcher. Rutger's work focuses on developing tools for offensive security, including Python and PowerShell scripts for exploitation and reverse shells. The content covers topics such as XSS prevention, malicious payload testing, and covert data hiding techniques, alongside automated lab setup and reconnaissance tools. | Programming Languages → Python 47 | script 532 tool 3907 security 6655 | |
| alserda.nl | Alserda | Alserda offers services for factory digitalization, web applications, and website development. The company describes itself as creative coders with expertise in various programming languages and frameworks. Alserda describes the collaboration and speed with which new features can be implemented as a strong point, citing Peter Bruining, an analyst at Signify. | Software Development & Engineering → App Development 1084 | programming language 42 web application 609 software 8291 | Gelderland → Nijmegen 9384 |
| simplified-it.nl | Simplified-IT | Simplified-IT organizes knowledge sessions and offers consulting and solutions in the areas of Cyber Security, Data Security & Managed (Cloud) Security. The Managed Detection & Response service offers continuous data traffic security, threat elimination, and protection of business applications and containers, carried out by a team of security experts 24/7. The website advertises for protection of home users, preventing data loss and securely keeping sensitive information through classification, encryption and insight into data flows. | Information Technology → IT Security 980 | cloud security 14 data security 20 data traffic 35 cybersecurity 688 | Haarlemmermeer → Schiphol 2163 |
| fidesque.nl | Fidesque | The Fidesque-App is designed to handle identification, authentication, and authorization all in one go. The website introduces OpenID provider Fidesque as an independent organization that provides infrastructure for secure online communication, document exchange, and access to partner services. The website provides information about the organization, general terms and conditions, privacy policy, a disclaimer, and contact details (address, telephone number, postal address, and KvK number). | Business Software → Document Management 328 | authorization 32 authentication 48 identification 76 document 1678 app 4595 | |
| 123-security.nl | 123Security | The website explains themes such as multi-factor authentication, compliance, cybercrime, and NIS2 in understandable language. It highlights the potential damage that can result from data breaches and the importance of proactive security measures. The site presents solutions, including tools such as LastPass, Yubico and KnowBe4, and describes how to implement and use them. | Information Technology → IT Security 980 | nis2 27 authentication 48 cybercrime 87 risk 2896 data 5872 | |
| experiensys.nl | Experiensys | The company offers a wide range of services, including system management, network management, 24/7 monitoring, consultancy, helpdesk, hardware and software, and cybersecurity solutions. Experiensys also provides managed services, including managed workstations, servers, networks, and backups, as well as cloud solutions such as Microsoft365 and cloud storage, and virtual private servers. Furthermore, the company delivers internet services such as VDSL, fiber optic, and mobile internet, and telephony solutions, such as VoIP telephone centers and mobile telephony. | IT → System Management 272 | managed services 95 network management 235 cloud solutions 281 system management 431 cybersecurity 688 monitor 1063 | |
| wth-security.nl | WTH Security | The company provides independent and honest advice without partnerships with vendors and without selling products or licenses, prioritizing integrity. Their service is characterized by extensive experience, high quality, a passion for IT security, and a pragmatic approach, utilizing an excellent international network and an extensive toolbox. WTH Security offers various services, including mystery guest visits to raise awareness, vulnerability scans to identify vulnerabilities, and penetration tests to test security. | Financial Services → Compliance 399 | toolbox 124 visit 380 security 6655 network 11123 | |
| arvidi.nl | ARVIDI IT Support | The website offers a password manager solution for securely organizing passwords and sensitive information. ARVIDI provides complete, flexible, and secure business workspaces tailored to the needs of SMEs, including cloud-based telephone systems and mobile access. The website provides information on cybersecurity developments and offers services such as DNS-Plus, vulnerability scans, and security advice. | Information Technology → IT Security 980 | password manager 12 cloud telephony 15 flexible workspace 85 password 213 cybersecurity 688 | |
| onesec-cybersecurity.nl | OneSec | The company offers various services including cybersecurity scans, risk analyses, incident response, pentesting, and vulnerability assessments. OneSec describes its expertise in protecting digital assets against cyber threats and highlights its team of experienced professionals with years of experience. The company focuses on managing risks and implementing technical measures, supporting clients with complex issues and ISMS (Information Security Management System) implementations. | | ism 13 cybersecurity 688 risk 2896 security 6655 | |
| magicstone.nl | Magicstone Cyber Security | The company observes a knowledge gap within SMBs regarding cybersecurity, leading businesses to often rely on readily available, but less effective, solutions. Magicstone Cyber Security carefully selects a portfolio of advanced cybersecurity solutions, based on thorough research and collaboration with partners. Services include data protection, email security, secure backups, endpoint and network protection, and cybersecurity insurance. The focus is on providing tailored, essential security solutions for SMBs. | Technology → SMB 127 | smb 89 cybersecurity 688 cloud 1527 risk 2896 data 5872 security 6655 | |
| a11n.nl | a11n | The consultancy combines academic knowledge with a practical approach to identity and access management. It specializes in helping clients gain control over access rights and improve both user experience and security through access controls. Arie Timmerman, the owner, is an experienced Identity Solution Architect. | Information Technology → IT Security 980 | identity 1028 policy 2149 consultancy 2596 architecture 3223 | |
| cybercarepolis.nl | Cybercarepolis | The CyberCare Polis reimburses the costs of assistance and damage as a result of specific cyber incidents. The website describes various types of cybercrime, such as identity fraud, phishing, malware infections, and the theft of personal data. Cybercarepolis presents statistics on cybercrime in the Netherlands, particularly among young people, based on CBS data (2017). | | cyber insurance 15 cybercrime 87 | |
| datect.nl | Datect | Datect emphasizes the importance of digital security and the need to securely safeguard business doors, given the value of business data and the risk of cyberattacks. The website offers various services, including penetration testing, security awareness training, cyber insurance, and NIS2 implementation assistance, aiming to protect businesses from cybercriminals. Datect offers demos to illustrate potential risks and opportunities to mitigate these risks, and provides packages and a free demo request. | Insurance & Risk → Risk Management 1060 | nis2 27 demo 320 cybersecurity 688 risk 2896 data 5872 package 6112 | |
| dedicatedondernemers.nl | Dedicated Ondernemers | The website publishes recent messages relevant for entrepreneurs, with a focus on protecting data. An article discusses the role of cybersecurity companies in protecting data and emphasizes the importance of both technical solutions and employee awareness. The website explains that data protection is a shared responsibility between entrepreneurs and cybersecurity professionals. | | cybersecurity 688 data 5872 | |
| boemcybersecurity.nl | BOEM Cybersecurity | BOEM Cybersecurity aims to make cybersecurity practical and understandable for the entire organization. The company offers a range of services, including governance, security assessment, implementation of standards such as ISO27001 and NEN-7510, CISO-as-a-Service, penetration testing, and security awareness training. BOEM Cybersecurity was founded in 2022 and values a unique approach where governance forms the foundation for sustainable cybersecurity to support the business. | Municipalities → Governance 1043 | governance 610 cybersecurity 688 implementation 1029 assessment 1205 training 28133 | |
| hellorisk.nl | Hello Risk | The website provides an explanation of privacy and information security in clear language, with the aim of informing users about their rights and responsibilities. Hello Risk positions itself as a ‘one-stop shop’ for various privacy-related tasks, from drafting policies to conducting DPIAs. The website emphasizes that privacy and information security require tailored solutions and that time and attention are needed for effective implementation, with teamwork and adaptation to changing regulations being crucial. | Privacy → Data Protection 224 | gdpr 179 information security 217 implementation 1029 privacy 1286 policy 2149 risk 2896 | |
| surelockacademy.nl | Surelock Academy | The academy focuses on creating security experts by transferring knowledge and developing skills. The goal is to connect candidates and clients, and strengthen the digital resilience of the Netherlands. The academy provides solutions for security challenges and helps organizations protect their data. | Training → IT Training 220 | skills 1105 candidate 1896 knowledge 3528 security 6655 | |
| werkenbijwemessage.nl | Wemessage | The website provides an overview of open positions within various departments such as development, online marketing, social media and other disciplines. Wemessage describes its corporate culture as informal, with a focus on teamwork, development and responsibility. Current job openings are highlighted, including a Medior SEA specialist in Zwolle and a Junior project assistant in Deventer, as well as a stage opportunity in online marketing. | Customer Relations → Customer Relationship Management 238 | teamwork 497 sea 782 online marketing 1085 job 2795 data 5872 | Overijssel → Deventer 4751 |
| nieuwsbekijken.nl | Nieuwsbekijken.nl | The website offers articles about the evolution of linkbuilding and the benefits of professional services in the SEO world, published on May 12, 2025. There are also articles about the revolution of 5G, the impact on mobile communication and the changes in daily life, appearing in March 2025. The website also covers topics such as privacy issues, social media, and the challenges for celebrities and artists. | Business → Economy 36666 | 5g 46 linkbuilding 473 privacy 1286 social media 3342 news 15293 | |
| privacyvoorondernemers.nl | iT-novative | The website informs about the new privacy legislation coming into effect on May 25, 2018, and emphasizes the obligations for businesses to adapt their operations. iT-novative offers support in preparing for the AVG/GDPR, including a free checklist, model contracts (‘AVG/GDPR Toolkit’), and customized advice. The company describes itself as a legal advisor (Wendy Rijcken) and an ICT professional (Teun Pleunis) who help businesses comply with the new regulations. | Marketing & Advertising → Entrepreneurship Advice 120 | gdpr 179 checklist 426 legal 937 ict 1049 | |
| incyber.nl | InCyber | The company consists of a team of cyber experts committed to a clear mission: making cybersecurity accessible to everyone. InCyber identifies digital threats and provides solutions, similar to a detective solving a mystery. The service offering includes penetration tests and a CISO-as-a-Service, focused on checking systems and detecting human vulnerabilities. | Information Technology → IT Security 980 | penetration test 17 cybersecurity 688 risk 2896 | |
| matchingvision.nl | MatchingVision | MatchingVision has a large network of freelancers specializing in various IT areas, including project management, security, and business intelligence. The company offers services such as cybersecurity, audits, assurance statements, training, and consultancy, primarily focused on information security and privacy. MatchingVision works with leading companies and has contacts in various sectors, including the healthcare sector, local government, central government, and SMEs. | | audits 158 information security 217 cybersecurity 688 freelancer 877 | |
| cyber7.nl | Cyber7 | The company offers various services including traineeships, consultancy, and security health checks. Cyber7 collaborates with Sirrus, a Managed Services Provider, to deliver cybersecurity solutions. The company aims to reduce the risk of cyber security incidents by proactively assisting organizations with security. | | cyberattacks 17 consultancy 2596 risk 2896 | |
| safehouse.nl | Safehouse Groep | Safehouse Groep offers tailored cybersecurity solutions, specifically targeted at medium-sized organizations, integrating people, organizations, and technology in their approach. The company specializes in providing a full-service approach, ranging from strategy to attack simulations, with a focus on understanding the customer's needs. Safehouse works with leading companies and delivers high-quality solutions with certified employees, leading to strong partnerships and status in the industry. | Information Technology → IT Security 980 | cybersecurity 688 partnership 1407 risk 2896 strategy 9379 | |
| cyberveiligheidzeeland.nl | Cyberveiligheid Zeeland | Cyberveiligheid Zeeland offers a comprehensive package for organizations with at least 10 FTE, focused on minimizing cyber risks. The initiative was founded by Jan Faasse, Jean-Paul de Pundert, and Adriaan Beirnaert, who together guide Zeeland’s SMEs from A to Z in preventing and mitigating cyber risks. The website highlights the potential damage of cyberattacks, including revenue loss, reputational damage, and fines, and encourages businesses to take action. | Privacy → Data Protection 224 | data breach 16 avg 145 | Netherlands → Zeeland 15493 |
| cyberriskverzekeren.nl | CyberRisk | The website explains that a cyber risk insurance policy is designed to cover non-material damage businesses suffer as a result of cybercrime. The site offers various types of cyber risk insurance tailored to sectors such as retail, hotel, freelancer, doctor and webshops. Furthermore, the website contains information about cybercrime, cybersecurity, hacking, DDoS attacks, and other relevant concepts, as well as news articles about cyberattacks and risks. | Information Technology → IT Security 980 | cyber risk 15 cybercrime 87 insurance 6359 | |
| mastersintelecom.nl | Masters in Telecom | Masters in Telecom provides advice services related to automation and telecommunications, helping customers choose the right network. The website emphasizes the importance of mobile security to protect company data. Masters in Telecom offers a complete package of telecom and internet services, as well as training for the use of mobile equipment, and specializes in telecommunications for non-profit organizations. | Radio & Communication → Telecommunications 1361 | telecommunication 154 voip 425 network 11123 | |
| dataalert.nl | DATA ALERT | The ‘WE PHISH’ system allows for the sending of personalized phishing emails and tracking of user responses. The console provides detailed reports on email and attachment opening, link clicks, and other interactions within campaigns. DATA ALERT offers online and onsite training to raise user awareness of phishing techniques and includes an online exam at the end of the training. | IT Security → Business Security 18 | phishing 34 campaign 3428 report 4551 training 28133 | |
| aquesta.nl | Aquesta | Aquesta offers various solutions, including Online Backup Manager, Active Monitoring, Office365 and Joan Meeting Room Booking Solution, aimed at a seamless digital workplace experience. The company strives to centralize the workplace, allowing users to easily and securely access systems, similar to using a car. Aquesta also offers cloud services such as Office 365 and various security services like Securityscan, Antivirus, EDR, Backup, Passwordmanager, 247SOC, Phishing Simulation, Penetration Testing and Securescan. | Software & Computing → Cloud Computing 1253 | workplace 1046 infrastructure 1460 cloud 1527 security 6655 | |
| teleserviceict.nl | Teleservice ICT | The company acts as the internal IT department for its clients, allowing them to focus on their core business activities. Teleservice ICT highlights fast response times to emergencies and the need for cybersecurity to prevent digital threats. The company offers IT management and cybersecurity solutions, both on-site and in a datacenter, with a proactive approach to advise clients on technological developments. | IT → Managed Services 720 | it-management 23 cybersecurity 688 emergency 750 digitalization 757 server 1036 network 11123 | |
| custompixels.nl | CustomPixels | The company develops web applications, websites, and apps, specifically tailored to the needs of individual organizations. CustomPixels also offers cybersecurity services, independently analyzing and assessing the security and accessibility of web applications and websites. Positive testimonials from clients such as LTO Noord and WSAC Ibex highlight the professionalism, engagement, and expertise of CustomPixels’ programmers. | Software Development & Engineering → Software Companies 509 | portal 591 web application 609 cybersecurity 688 software 8291 | Gelderland → Wageningen 1949 |
| shiftred.nl | Shift Red | The website outlines Shift Red's services, including holistic asset visibility, vulnerability management, application security, architectural review, and secure development practices. Shift Red emphasizes its 20+ years of experience and focuses on providing practical solutions without relying on trending security jargon. They focus on innovative security measures, like supply chain attacks. The consultancy's core values include embracing innovation, adopting Zero Trust principles, and focusing on collaborative and strategic approaches to cybersecurity. | Information Technology → IT Security 980 | risk 2896 architecture 3223 consulting 3639 security 6655 | |
| itfactor.nl | IT Factor | IT Factor offers services in the areas of Business Intelligence, GenAI, legal tech, and change management, specifically focused on the legal sector. The website provides insights and information on topics such as Cloud transition, Generative AI, and Microsoft 365 Copilot, and offers internships and events around these themes. IT Factor guides companies in implementing AI platforms and management dashboards, and functions as a sounding board for legal professionals regarding the development of artificial intelligence. | Data Analysis → Business Intelligence 1002 | business intelligence 227 law firm 585 ai 2181 | |
| jene-beveiliging.nl | Jene-Beveiliging.nl | The website features blogs, information, and recent news articles on various security topics. The content is presented in an accessible way, suitable for both beginners and experienced users. Topics covered include fire safety for businesses, privacy when using self-checkout kiosks, and tips for improving home and outdoor safety. | Security → Business Security 49 | surveillance camera 92 security system 212 security 6655 blog 13392 | |
| cybersecuritychallengers.nl | Cyber Security Challengers | The company offers analysis, advice, and implementation services in the field of cybersecurity. They support clients with interim cybersecurity services, assessments, risk analyses, certification pathways, and cybersecurity architecture. The company emphasizes trust within the organization and encourages open communication and collaboration. | Privacy → Data Protection 224 | risk analysis 217 cybersecurity 688 implementation 1029 privacy 1286 architecture 3223 collaboration 16036 | De Ronde Venen → Abcoude 472 |
| awarenessnederland.nl | Awareness Nederland | The website provides information about phishing, a common online threat. Awareness Nederland offers tailored training and software solutions to improve organizational cybersecurity. The organization provides a preliminary assessment and a fully automated security awareness training module to increase employee awareness and reduce the risk of successful phishing attacks. | Real Estate → Enterprises 162 | phishing 34 cybersecurity 688 awareness 1735 training 28133 | |
| cyberplaza.nl | CyberPlaza International | The website offers various services including risk analyses, strategic solutions, and policy advice. CyberPlaza International helps organizations with the selection, implementation, and optimization of security technologies. The organization emphasizes employee preparation through training and ongoing support to strengthen the organization internally. | Insurance & Risk → Risk Management 1060 | policy advice 38 risk analysis 217 strategy 9379 training 28133 | |
| futureinsightevents.nl | Future Insight | The event, planned for Thursday, June 9, 2022, in Duisburg (s-Gravenhage), offers attendees the opportunity to be inspired and get acquainted with the latest developments. The day is offered with a talk show, workshops, knowledge sessions and attention for social interaction, where experts share valuable insights on data-driven solutions and sustainable development. The event presents leaders in various fields who demonstrate how they use data and digital solutions to improve projects and the environment, with emphasis on developments in data platforms, Clearly and BIM models. | Architecture → BIM 53 | smart city 27 bim 307 speaker 1481 innovation 4659 data 5872 workshop 19325 | Netherlands → Utrecht 48901 |
| syncomit.nl | Syncomit | The company emphasizes the importance of a good and secure IT infrastructure for the continuity and progress of an organization, with all employees benefiting from it. Syncomit helps organizations with complex IT challenges and offers reassurance through a thorough audit. The website contains information about the company's services and contact details. | Financial Services → Compliance 399 | cyber risk 15 data management 83 information security 217 audit 622 it 1539 | Vleuten - De Meern → De Meern 541 |
| cyberconnects.nl | Cyber Connects | The website describes the integration of cybersecurity within organizations’ operations, focusing on people, processes, and technology to implement an operational security strategy. CyberConnects offers consultancy regarding cybersecurity management and compliance with cyber laws and regulations, with consultants proactively addressing complexity. The founder, Reza Razai, describes an early fascination with connectivity and a goal to ensure everyone can safely benefit from the internet. | Management → IT Strategy 185 | cybersecurity 688 consultancy 2596 culture 3922 connection 4007 safety 5819 | |
| anderissecurity.nl | Anderis IT Security | Anderis IT Security describes itself as a specialist in cybersecurity employing a step-by-step approach to securing IT environments. The website offers various services, including Threat Modeling, Pen Testing, and Managed Detection & Response, with the goal of detecting threats early on. Anderis IT Security explains that they utilize a personalized approach and prioritize the customer's needs when assembling the appropriate security solution. | | threat 62 cybersecurity 688 risk 2896 | |
| talox.nl | Talox | Organizations, both large and small, are daily victims of cybercriminals, such as network hacking, ransomware attacks, and phishing fraud. Talox offers a Cybersecurity Assessment to help companies gain insight into their current situation, risks, and potential improvements. The organization also provides penetration testing (pentests) to identify vulnerabilities, network monitoring to detect threats, and preventative and strategic advice. | Insurance & Risk → Risk Management 1060 | pentest 17 cybersecurity 688 monitor 1063 risk 2896 strategy 9379 | |
| caresecure.nl | CareSecure | CareSecure supports healthcare providers with information security, addressing the increasing threat of cybercrime and data breaches. The website emphasizes the need for employee awareness and adequate measures, considering the growing reliance on internet and cloud services. CareSecure possesses extensive experience and expertise in minimizing IT risks and offering solutions within the healthcare sector. | Health → Medical Care & Services 29461 | data breaches 14 cybercrime 87 cloud services 198 information security 217 risk 2896 employee 4429 | |
| activetechnology.nl | Active Technology | The company offers cybersecurity services, focusing on security awareness, management, and infrastructure assessments. They provide web hosting and maintenance services, aiming to deliver quality, reliable, and affordable hosting for personal and business websites. Active Technology operates as a full-service IT partner, specializing in networks, cybersecurity, custom software, and databases, employing experts based in Rotterdam. | IT → Network Management 702 | cybersecurity 688 webhosting 948 database 1153 software 8291 network 11123 | South-Holland → Rotterdam 25048 |
| friendlycyber.nl | Stichting Friendly Cyber | The foundation aims to disseminate knowledge about cloud and cybersecurity, promote its application in various environments, and enhance connections between professionals and organizations. To achieve this, the foundation organizes conferences, thematic meetings, and maintains contact with relevant organizations and experts. One of the events organized by the foundation is BSides Amsterdam and BSides Groningen. | Information Technology → IT Security 980 | cybersecurity 688 conference 763 cloud 1527 technology 6816 event 45199 | North-Holland → Amsterdam 41253 |
| cyberriskinsurance.nl | CyberriskInsurance.nl | The website compares cyber insurance offerings from various providers, including AIG, Allianz, Chubb, De Goudse, HDI, Hiscox, MS Amlin, and Zurich. The site explains that cyber insurance is essential for cyber prevention and provides expertise in dealing with cyber incidents. It emphasizes that cyberattacks are becoming increasingly common and that the costs of an attack can be substantial, with an average estimate of €25,000 for small businesses. | Insurance & Risk → Risk Management 1060 | cyber risk 15 cyber insurance 15 provider 1111 quote 12863 | |
| henkdehacker.nl | Dataverzekering.nl | Many small and medium-sized businesses believe they are not targets for cybercriminals, but Henk de Hacker believes the opposite. A large percentage of MKB companies have already dealt with cyber incidents, often only after 191 days of being aware of it. The website offers various coverages within a cyber insurance policy, including system failures, privacy breaches, digital liability, hacking, extortion, and revenue loss due to cyberattacks. | Information Technology → IT Security 980 | cyber insurance 15 cybercrime 87 risk 2896 data 5872 | |
| ismijnmailgehackt.nl | ismijnmailgehackt.nl | The website provides a free 'email hack check' tool allowing users to verify the security of their online accounts against hackers. The website article describes five signals that may indicate an account has been hacked, such as unusual login activity and suspicious email activity. The website also contains news about security risks in various software programs, such as Firefox, Thunderbird, CrushFTP, Microsoft SharePoint Server, XWiki, and Wing FTP Server, as reported by the NCSC. | Security → Online Security 45 | hack 36 email 1012 risk 2896 account 5781 | |
| cyberadviseur.nl | Cyberadviseur | Cyberattacks can lead to significant costs, including damage from ransomware and data breaches. The website provides information on cyber insurance, prevention, and the consequences of cybercrime, such as data breaches and ransomware. Cyberadviseur.nl offers independent advice, risk management, and quote requests for cyber insurance, focused on minimizing the financial impact of cyber incidents. | Insurance & Risk → Risk Management 1060 | cyber risk 15 cyber insurance 15 data breach 16 cyberattack 21 ransomware 41 | |
| bredley.nl | Bredley B.V. | Bredley offers professional IT services, primarily focusing on the construction of corporate IT infrastructure and the design of corporate networks. They also provide solutions for information security systems, including SOC as a Service for centralizing cybersecurity protection. The company’s services include IT infrastructure design and implementation, cloud solutions, IT consulting, and audits, all tailored to meet the specific needs of businesses. | IT → Managed Services 720 | it infrastructure 84 information security 217 cloud 1527 consulting 3639 network 11123 | South-Holland → Capelle aan den IJssel 1616 |
| gpsdome.nl | GPS Protection Company | The company offers two core products: GPSdome™, which detects and protects against GPS jamming, and OtoSphere™, which enables real-time detection of jamming attacks. Their technology, originally developed for military use, is now commercially available and compliant with CE standards, emphasizing affordability and ease of implementation. The website outlines the challenges posed by GPS jamming in various industries and highlights the company’s solutions for protecting GPS (GNSS) receivers from interference and operational downtime. | Navigation → GPS 77 | jam 122 gps 255 monitor 1063 technology 6816 | |
| it-serve.nl | IT-serve | The company offers a wide range of services, including IT management, cloud solutions, VOIP, and connectivity. IT-serve focuses on taking the burden off clients by delivering professional ICT solutions. The website contains information about the services offered, testimonials from clients, and contact details. | Radio & Communication → Telecommunications 1361 | it management 150 connectivity 173 voip 425 cloud 1527 | |
| nomorecybercrime.nl | No More Cybercrime | The platform provides online courses that teach how to protect oneself against cybercrime. The website features a free test to assess an individual’s cybersecurity. No More Cybercrime is well-known in the media and has a decade of experience in cybersecurity, led by Gina Doekhie, a cybercrime specialist who focuses on forensic investigations after hack attempts. | Security → Antivirus Software 25 | cybercrime 87 cybersecurity 688 test 769 course 14728 | |
| devbright.nl | Devbright | Devbright works with top designers to accurately implement designs and create websites that are user-friendly and results-oriented. The company offers services such as web design, e-commerce development, and custom applications, with a focus on technical implementation, consulting, and guidance for designers. Devbright works with several design partners and has worked on projects such as VPS, Intersettle, Improvit, and SamSam. | Consulting → Technical Consulting 382 | application 3377 partner 4272 technology 6816 design 27202 | |
| paradigmsecurity.nl | Paradigm Security | The company offers a wide range of services, including virtual CISO consulting, risk assessments, cybersecurity maturity assessments, cloud security, data privacy (AVG), and ISO 27001 consultancy. Paradigm Security was founded by veterans with expertise in GRC, vulnerability management, and training, and emphasizes customer satisfaction and customization. The company focuses on making security visible for all aspects of its clients’ businesses, including people, products, and platforms, and offers a mix of consulting, services, and training to protect against cyberattacks. | Financial Services → Compliance 399 | compliance 506 risk 2896 security 6655 technology 6816 | |
| mensendieck-thamar.nl | Praktijk Oefentherapie Mensendieck Thamar Pfluger-van Dijk | The practice uses ZIVVER to securely transmit sensitive information, such as patient data and BSN numbers. Since May 25, 2018, the practice has been working with ZIVVER to ensure the security of this communication, making it impossible for unauthorized individuals to read the messages. By using ZIVVER, the practice provides a high level of information security and demonstrates care for the privacy of its patients. | Physical Therapy → Mensendieck Therapy 83 | mensendieck 26 patient 4082 | |
| acesecure.nl | ACESecure | ACESecure helps organizations with IAM and cybersecurity, focused on improving digital security. The website provides services such as Identity & Access Management, cybersecurity consulting, and privacy & data protection consulting (AVG). Gianni Petropoulos, the specialist behind ACESecure, offers his expertise and that of his team to help organizations with security issues. | Information Technology → IT Security 980 | right 379 cybersecurity 688 | |
| aiv-automatisering.nl | AIV automatisering | The company provides an all-in-one system management solution with fixed costs, without unnecessary surprises. AIV automatisering offers various services, including telephony, cybersecurity, and a free IT consultation. Customers value AIV automatisering due to direct assistance, rapid problem-solving, and professional service, making the IT department an extension of the organization. | IT → System Management 272 | system management 431 telephony 494 cybersecurity 688 | |
| blomhighend.nl | Blom High End projecten | The company works with various professionals, including architects, contractors, and security advisors, to realize the wishes of high-end clients. The clients are often exclusive owners of multiple homes and workplaces, both nationally and internationally, who demand high standards of privacy and quality. Blom High End projecten offers complete solutions, from advice to maintenance and service, with attention to privacy in every stage. | Business & Professional → Speakers 165 Community → Government & Administration 10567 | teamwork 497 privacy 1286 maintenance 20093 | North-Holland → Beverwijk 1690 |
| nullbyte.nl | Nullbyte | The company values transparency and quality and offers various services, including pentests for websites, web applications, internal networks, external infrastructure, and physical locations. Nullbyte also offers social engineering projects, Microsoft 365 & Azure security assessments, and DigiD pentests to identify vulnerabilities and assess risks. These services aim to simulate attacks to test organizations' preparedness for a realistic attack and improve system security. | Information Technology → IT Security 980 | pentest 17 assessment 1205 infrastructure 1460 | |
| zynyo.nl | Zynyo | Zynyo offers various digital services, including eSign, eSeal, eID and eDelivery, which help organizations with scheduling appointments and sealing documents with legal certainty. Zynyo’s services can be used via an integrated platform, with various product applications, such as a cloud application for larger organizations and integrations with SharePoint. The platform is integrated with various software vendors and can be used from browsers, helping organizations to work efficiently digitally and build trust. | | digital signature 10 integration 1451 application 3377 security 6655 | |
| biscayne.nl | Biscayne Consultancy | Since 1995, Biscayne Consultancy has been providing IT services, emphasizing exceeding customer expectations and delivering solutions within budget and deadlines. The company has expertise in managing middleware and connections, particularly for a wholesale distributor, as well as in blockchain projects, including mining equipment and mining pools. Biscayne Consultancy has extensive experience with the development and implementation of E-Commerce solutions based on open-source platforms such as OScommerce, ZenCart, and OpenCart, and also offers web hosting services. | Telecommunications → VoIP 297 | middleware 11 it services 130 blockchain 250 e-commerce 738 webhosting 948 | |
| rb9.nl | Khaled | Khaled, who goes by the handles notkmhn and kmhn online, shares his interests in computer science, cybersecurity, and related subfields such as programming, software architecture, and cryptography. He regularly posts about his research projects, CTF participation with Spotless, and technical explorations, often documenting them on his website and rootfs.eu. Khaled’s work includes identifying and exploiting vulnerabilities in Tuya smart devices, reporting a bug in Apache Tika, and discovering a MagicINFO Server takeover vulnerability in Samsung TVs. | Science → Computer Science 2413 | cryptography 31 vulnerability 149 programming 575 cybersecurity 688 | |
| computerhulprheden.nl | Computerhulp Rheden | The website covers various aspects of cybersecurity, including the basics of security, network security, privacy, and application security. It offers blogs and articles on relevant topics, such as cyberattacks, the importance of strong passwords, and strategies for test automation. The website emphasizes the need for cybersecurity for businesses in Utrecht and provides information about IT specialists who can help with IT problems. | Business Software → Cloud Solutions 82 | cybersecurity 688 privacy 1286 application 3377 network 11123 blog 13392 | |
| xalex.nl | Alexander van Ee | Alexander van Ee is an IT security specialist with over 20 years of experience in identifying and analyzing IT risks. He offers knowledge and advice on topics such as ethical hacking, networks, applications, encryption, and blockchain technology. The consultant has experience with risk analyses, ISMS implementations (including ‘lite’ implementations based on ISO27001) and supports sales trajectories. | Information Technology → IT Security 980 | iso27001 22 risk analysis 217 blockchain 250 risk 2896 application 3377 | |
| bytenova.nl | ByteNova B.V | The website highlights ByteNova’s expertise in FIDO 2 authentication and offers products like Printers Security Reader, Microsoft Teams Rooms, and customized HID Readers. ByteNova addresses current market challenges related to authentication, including the management of multiple solutions, lack of BYOD support, and high operational costs, suggesting their ‘All-in-One Authentication’ solution. The company’s core offering is based on providing cutting-edge, tamper-proof physical access readers compatible with existing infrastructure and modern protocols like FIDO2, alongside centralized monitoring for Microsoft Teams Rooms. | | authentication 48 microsoft teams 49 readers 74 security 6655 | North-Holland → Amsterdam 41253 |
| lokaalnet.nl | LokaalNET | The website provides fast internet services, smart solutions for buildings, and security systems for objects, with particular emphasis on locations outside the EU, such as the sea and mountains. LokaalNET also offers support with other Dutch internet providers like Ziggo and KPN and advises on Starlink as an alternative. The website focuses on securing internet connections, securing homes with cameras and lighting, and automating tasks such as lighting houses and managing pets. | Networking → WiFi 91 | starlink 10 wifi 1372 internet 1678 camera 1733 building 3204 security 6655 | North-Holland → Bergen 2009 |
| offmain.nl | Offmain | Offmain is a company based in Holland with a global network of agencies, offering expertise in offshore, maritime, and industrial safety. Their services include consultancy, training (ranging from skilled to management levels), and a 24/7 response team providing assistance, knowledge, manpower, and equipment related to incident response. The website also features a photo gallery and provides contact information, highlighting their commitment to demonstrating their work through visual storytelling and offering fire safety solutions to a variety of companies. | Insurance & Risk → Risk Management 1060 | response 81 incident 335 consultancy 2596 safety 5819 training 28133 | |
| q-cyber.nl | Q-Cyber | Q-Cyber offers advice and policy writing services to protect data, including Q-Cyber Scans (penetration testing and phishing tests) and the appointment of a virtual CISO through Q-Cyber CISO Services. The organization, formerly Quality ICT, has various specializations in cybersecurity that come together in diverse services, such as consultants and an NIS2 Production Team. Q-Cyber is known for its independent advice, tailored to the available resources of the customer and not bound to specific software vendors. | | cybersecurity 688 scan 790 policy 2149 data 5872 | |
| ojkb.nl | Ouwe Jongens Krentebrood | The website provides access to all episodes of the television series #OJKBTV. It presents the tour data of ‘Ouwe Jongens Krentebrood’, allowing visitors to see where the group can be found throughout the country. The site also contains information about events, bookings, and contact details of the management and Bookings group, B-Bass Music & Events Group.” | Television → Reality 11 | bookings 523 event 45199 | North-Holland → Purmerend 2620 |
| kaapjeveiligheid.nl | Kaap Hoorn ICT Security B.V. | The company provides services such as penetration testing, roadmap development, awareness campaigns, audits, and IT security zero-measure assessments. A key focus is on security awareness, with campaigns organized to inform and train employees about the risks of IT security. Kaap Hoorn ICT Security also offers penetration tests (penetrability tests) to identify vulnerabilities in systems. | Information Technology → IT Security 980 | it environment 35 penetration testing 43 microsoft 365 430 audit 622 cybersecurity 688 awareness 1735 | |
| mijndigid.nl | Domain Owner | The website aims to serve as a comprehensive source for digital identity-related information. It offers a range of topics from general to more specialized areas related to digital identity. The domain owner is offering the website for sale at a price of 1750 USD. | Resources → Information Services 314 | resources 310 domain 1811 | |
| staticimgsrv.nl | Static Imgsrv | The website describes the problems businesses face with managing and protecting their assets, particularly in relation to debt and cyber threats. The company offers a variety of services including cybersecurity consulting, vulnerability assessments, secure IT infrastructure, and CMMC certification. The site also features a blog with articles on topics such as fire safety, data science, and big data, with a focus on their impact on organizations. | Insurance & Risk → Risk Management 1060 | asset 591 cybersecurity 688 risk 2896 consulting 3639 | |
| tielit.nl | Tiel IT | The company has over 25 years of experience providing high-quality IT services to SMEs, specializing in tailored solutions. Tiel IT offers a wide range of services, including network management, cybersecurity, and cloud solutions, focused on ensuring the operational and secure functioning of customers’ systems. Services include troubleshooting, network installation and configuration, continuous maintenance and monitoring, cybersecurity training and awareness, risk assessment, and backup and recovery services. | IT → Network Management 702 | cybersecurity 688 cloud 1527 network 11123 | |
| 24vault.nl | 24Vault | 24Vault offers a safe and intuitive way to send files, addressing the security risks of traditional methods like email and internet applications. The process involves uploading files, entering recipient contact details, and sending a secure link that can be downloaded after SMS verification. After downloading, files are automatically deleted from the server within 24 hours, ensuring security and privacy. | Streaming → File Sharing 11 | send 25 recipient 51 files 290 server 1036 security 6655 | |
| menc-cilinders.nl | M&C Cilinders | The website emphasizes the importance of implementing a range of safety measures, including safety programs, inspection programs, training programs, audits, and incident reporting. Furthermore, the possibility is discussed of improving safety by utilizing technological solutions, such as security software and advanced access control systems. The focus is on reducing safety risks in industrial and production environments. | Ironmongery & Hardware → Hinges 88 | cylinder 206 safety 5819 technology 6816 network 11123 | |
| sonusvita.nl | Sonus Vita | The website addresses the growing concern about digital security, particularly the shift of personal and professional life to digital platforms. It discusses emerging security technologies such as biometrics, artificial intelligence (AI), and blockchain, and how they contribute to data protection. The website also addresses the risks to online privacy, including identity theft, and provides practical advice for improving security. | Culture → Science 5261 | blockchain 250 privacy 1286 ai 2181 risk 2896 security 6655 technology 6816 | |
| ransomwaresimulatie.nl | Rootsec B.V. | The website provides realistic Ransomware Simulations allowing users to test and improve their digital resilience. The simulations enable users to learn about potential vulnerabilities and how to address them effectively, providing valuable insights into cyber threats. Rootsec B.V., a company based in Almere, Netherlands, offers various customized simulations and cybersecurity expertise. | Insurance & Risk → Risk Management 1060 | threat 62 response 81 simulation 241 cybersecurity 688 resilience 1091 | Flevoland → Almere 7765 |
| voorendt.nl | Voorendt | The website offers services including analyzing organizational digital resilience and conducting phishing tests. Voorendt helps organizations comply with the Wet bescherming persoonsgegevens (Wbp) and the AVG through Privacy Impact Assessments. The company also provides expertise in social engineering and offers advice on measures against phishing attacks. | Privacy → Data Protection 224 | attack 31 measures 192 cybersecurity 688 privacy 1286 risk 2896 | |
| it-level.nl | IT-Level | The website addresses the importance of cybersecurity in the current digital world and the measures needed to protect digital devices and data. IT-Level offers services for system management, where system administrators are responsible for maintaining and securing a company’s IT infrastructure. The website describes the remote support service, which allows customers to receive remote assistance with technical issues without physical presence. | Computer → Computer Support 1003 | remote support 19 system management 431 cybersecurity 688 | Zaanstad → Wormerveer 530 |
| jasperboot.nl | stichting Challenge The Cyber | Jasper Boot is a board member and treasurer of stichting Challenge The Cyber, an organization that runs a national cybersecurity competition and selects a national team for the European Cybersecurity Challenge. He also hosts and produces the ‘Wat de Hack?!’ podcast, a Dutch cybersecurity podcast aimed at making the topic accessible and engaging to a wider audience through interviews. Furthermore, Jasper develops technology and custom show control systems for escaperooms, and applies IT solutions to enhance the immersive experiences at events like Halloween Fright Nights. | Recreation → Theme Parks & Entertainment 8254 | cybersecurity 688 it 1539 podcast 3328 technology 6816 event 45199 | |
| asfelias.nl | Asfelias | The company offers services such as vulnerability scans and cybersecurity health checks, aimed at identifying weaknesses in a company’s security. Asfelias emphasizes the importance of clear and understandable reports that are specifically tailored to the customer’s needs, without technical jargon. The company strives for service simplification by collecting essential information and managing the rest of the security measures, and offers customer testimonials to illustrate the quality of its services. | Insurance & Risk → Risk Management 1060 | vulnerability 149 cybersecurity 688 report 4551 | |
| lisadewilde.nl | Cyber Radiant | Lisa de Wilde is a cybersecurity expert with experience in solving complex cyberattacks for organizations in the Netherlands and abroad. She provides speaking engagements, workshops, training sessions, and participation in events and webinars, sharing experiences from the front line. Her goal is to help organizations prepare for incidents by delivering interactive and tailored presentations. | Information Technology → IT Security 980 | cyberattacks 17 knowledge sharing 162 incident 335 cybersecurity 688 workshop 19325 training 28133 | |
| intosec.nl | intoSEC | Organizations must map their digital risks and proactively take measures to respond to system failures, cyberattacks, or data breaches. Effective digital resilience requires clear agreements, current scenarios, and proactive action, such as identifying and prioritizing risks and aligning processes. Preparation is essential to ensure speed, overview and coordination during an incident and to limit the damage. The website refers to ncsc.nl for more information on digital resilience. | Insurance & Risk → Risk Management 1060 | digital resilience 13 scenario 281 risk 2896 security 6655 | |
| werkenbijpurasec.nl | PuraSec B.V. | PuraSec offers vacancies for roles such as Information Security Advisor, Technical Security Officer and Ethical Hacker. The website describes the responsibilities and requirements for each role, including the required expertise and skills. PuraSec highlights a culture of pragmatism and accessibility and provides contact information for questions and applications. | Jobs → Vacancies 1099 | information security 217 incident 335 culture 3922 vacancy 6598 | |
| cybertec.nl | Fomaco Invest | The company’s core belief is that they can exceed client expectations by deeply understanding their specific needs and building trusted relationships. Fomaco Invest offers three primary service categories: tailored coaching for startups and scaleups, strategic guidance for cybersecurity ventures, and market expansion support. Leveraging extensive cross-sector experience, Fomaco Invest assists clients in navigating the complexities of the cybersecurity industry and achieving sustainable growth. | | cybersecurity 688 growth 4054 coach 25810 | |
| gettingtowe.nl | Getting to WE | The website describes the services offered by the company, which believes in the power of collaboration and clear communication. The website presents testimonials from Jan Wierenga and Wim Straetmans, who praise Katja and Ellen's approach for their combination of professional experience and life wisdom. The website provides information about the company's address in Amsterdam and includes details on privacy statements, cookie policies, and cookie settings. | Business Strategy → Business Development 730 | testimonials 416 approach 971 privacy 1286 collaboration 16036 | North-Holland → Amsterdam 41253 |
| cybersecurityxpert.nl | Escape Room Designer B.V. | The website offers training programs focusing on various aspects of cyber security, including phishing, ransomware, and privacy. An innovative approach is used through mobile escape rooms focused on cyber security to increase employee awareness. The training programs are suitable for all employees and can be delivered on-site, designed to be both serious and fun. | Training → Corporate Training 1331 | escape room 430 cybersecurity 688 risk 2896 employee 4429 training 28133 | |
| comfu.nl | Comfu | The company recognizes that awareness alone is insufficient and that the implementation of security measures is often hampered by resistance from employees. Comfu offers solutions and advice to strengthen the human side of security, particularly by encouraging behavioral change and involving the entire organization. The services offered include research, communication, training, and organizational-wide advice to achieve security goals and create a safer organization. | | behavior 1779 risk 2896 communication 10162 training 28133 | |
| hoefenhaagcybersecure.nl | Eagle Creek Consultancy | The website provides information about the risks of cyberattacks and how to prevent them, with recommendations regarding the use of multi-factor authentication and password managers. The consultancy offers services such as identifying risks, conducting security audits, and assisting with recovery after a cyberattack. The website emphasizes transparency in pricing and professional knowledge applied to private and small business sectors, with a focus on the Hoef and Haag region. | Information Technology → IT Security 980 | audit 622 cybersecurity 688 identity 1028 risk 2896 account 5781 | |
| benveiliger.nl | Benveiliger BV | The website publishes articles about the safety of Sao Paulo, a large Brazilian city. It also addresses questions about the safety of placing pools on balconies. The site provides information about alternatives to alarm systems such as Verisure, and about the security of password managers like LastPass and Surfshark. | Safety → Personal Safety 23 | vpn 167 password 213 alarm 377 apartment 5088 safety 5819 | |
| quantix.nl | Quantix | Quantix believes in the power of technology to elevate businesses and provides solutions in software development, IT infrastructure, cybersecurity, and cloud solutions. The company strives to make technology accessible and effective for businesses of all sizes, with a focus on customized solutions and proactive support. Quantix offers advanced cybersecurity solutions and innovative cloud solutions, and is available 24/7 with expert support. | IT → Managed Services 720 | it-infrastructure 19 cloud solutions 281 software development 358 cybersecurity 688 software 8291 | Flevoland → Almere 7765 |
| manousch.nl | Manouschka Bouman | Manouschka Bouman offers training and courses on public speaking, storytelling, and ceremony speaking, geared towards professionals. She is an experienced speaker and presenter who trains ceremony speakers for special moments, such as weddings, and serves as a day chair for corporate events. Additionally, she provides business coaching for creative entrepreneurs and acts as a celebrant, crafting personalized speeches for weddings and funerals. | | business coach 37 speaker 1481 presentation 1785 training 28133 | |
| bewustict.nl | Kies bewust | The company provides a wide range of services including VoIP telephony, mobile communication, online workplaces, network management, and cybersecurity. Kies bewust works with A-brand suppliers to deliver reliable and scalable solutions meeting high safety standards and offers a fixed monthly fee. The service provider offers 24/7 support, flexible cloud solutions, and advanced cybersecurity to ensure the optimal functioning of the client's ICT environment. | IT → Management 346 | online workplace 20 voip 425 ict 1049 cloud 1527 security 6655 network 11123 | |
| en4s.nl | EN4S Consultancy BV | The website presents the vision, team and projects of EN4S Consultancy. The company emphasizes a knowledge-based approach, continuously updating its expertise in cybersecurity. EN4S Consultancy offers strategic, tactical and operational advice and guidance on implementing cybersecurity programs, governance models and technologies. | Cloud Computing → Microsoft 365 97 | governance 610 cybersecurity 688 implementation 1029 risk 2896 | |
| verwegdebeste.nl | Techaro | The website uses Anubis, a system based on Proof-of-Work, to discourage automated scraping of its content by AI companies. This system adds a hurdle for scrapers, increasing their costs and causing potential downtime for the website. Anubis's primary goal is to identify and block headless browsers, which are often used in scraping operations, rather than directly confronting users who might be legitimate visitors. The website acknowledges that Anubis requires JavaScript and requests users to disable plugins like JShelter to bypass the challenge. It is developed and protected by Techaro and features design by CELPHASE. | Web Design & Development → Web Technologies 34 | plugins 123 javascript 238 challenge 1697 ai 2181 | |
| osintelink.nl | OSINTELINK | OSINTELINK has operated for over 15 years, producing more than 250 reports annually, focusing on gathering, analyzing, and de-escalating security threats at local, national, and global levels. The organization offers tools for private and public organizations to enhance online and offline security awareness through education and training programs. OSINTELINK conducts research, analysis, and education initiatives to address evolving security challenges, with a focus on detecting, determining, and deterring threats, particularly those related to organized crime and online activities. | Insurance & Risk → Risk Management 1060 | threat 62 intelligence 81 social media 3342 security 6655 research 8967 | |
| oeribel.nl | Oeribel | Berend, the owner of Oeribel, has over 20 years of experience as a Java developer and works with the latest technologies and methodologies. The website describes Oeribel’s expertise in backend and frontend development, as well as his knowledge of databases, operating systems, and application servers. Oeribel’s contact details, including email address and copyright information, can be found on the website. | Software Development & Engineering → Software Companies 509 | java 176 framework 283 methodology 332 database 1153 | |
| ipservice.nl | IPService | IPService offers various business internet connections via fiber optic, copper, or cable, depending on the customer's postcode. The company provides professional camera security and access control, and complete VOIP installations for companies with multiple locations. IPService has been active in the sector for 20 years and is known as a specialist in data and telecommunications solutions for the business market. | Communication → Telephony 339 Radio & Communication → Telecommunications 1361 | internet connection 93 postcode 221 network management 235 telephony 494 security 6655 | |
| smiletools.nl | SmileTools | With SmileTools’ cybersecurity services, clients of IT partners can use Microsoft 365 securely and comply with AVG regulations, while partners structure their IT policies. The company collaborates with the NCSC and offers solutions for risk management, security measures, and procedures, including monitoring Microsoft 365 logbooks. SmileTools focuses on providing simple, implementable tools that help IT companies structure, monitor, and improve their security policies, resulting in more peace of mind, clarity, and satisfaction for both the company and its clients. | IT → Managed Services 720 | avg 145 microsoft 365 430 policy 2149 tool 3907 security 6655 | |
| digitaalbeveiliger.nl | Digitaal Beveiliger | The website offers services such as security checks, penetration tests, customized CISO services, data recovery, and workshops focused on increasing digital resilience. An ethical hacker and a CISO work together to identify vulnerabilities in systems and help to establish policies and procedures to improve digital security. The digital security provider offers clear insights into weaknesses, creates action plans, and reduces concerns about cybersecurity, allowing customers to operate with confidence. | Insurance & Risk → Risk Management 1060 | cybersecurity 688 policy 2149 risk 2896 security 6655 network 11123 | Geldrop-Mierlo → Mierlo 459 |
| itcowboys.nl | ITCowboys | The website publishes podcasts and blogs on cybersecurity and security trends, including topics such as data governance, vulnerability management, and XDR. The podcasts are presented by Jordy Herber and Paul Erlings, who discuss various scenarios and security measures. The blog offers articles about Microsoft 365 Security & Compliance, Cloud App Security & Compliance, App Governance, and other relevant security topics, focusing on measuring and improving security posture. | Cloud Computing → Microsoft 365 97 | microsoft 365 430 podcast 3328 security 6655 blog 13392 | |
| itcloudspot.nl | IT CloudSpot | The website describes the services offered by IT CloudSpot, including cybersecurity, cloud solutions, VaMo Telefonie, consulting, NaaS, and web hosting, aimed at supporting business technology. The company emphasizes the importance of a reliable technological foundation for a business and offers solutions such as Cloud PCs that seamlessly integrate with existing systems and networks. IT CloudSpot offers services such as cybersecurity, a stable network, and VaMo Telefonie, with the goal of ensuring the security, accessibility, and reliability of its clients' IT infrastructure. | Software & Computing → Cloud Computing 1253 | telephony 494 cybersecurity 688 cloud 1527 consulting 3639 network 11123 | |
| cortechs.nl | corTechs | corTechs provides complete ICT management solutions, including cloud solutions, network management, and backup solutions, aiming to ensure the reliability and security of clients’ IT infrastructure. The website emphasizes the importance of cybersecurity awareness training to protect employees from cyberattacks, particularly through social engineering and phishing. corTechs also offers various hardware solutions such as laptops, smartphones, printers, and audio/visual equipment, and provides support for various network technologies, including 5G Fall-over connections and VPNs. | | cybersecurity 688 ict 1049 cloud 1527 network 11123 training 28133 | |
| cyberdefensie.nl | Cyberdefensie | Cyberdefensie consists of a network of cybersecurity experts who provide advice and assistance as needed. The website covers topics such as cyber threats, penetration testing, and website security checks, with the goal of protecting organizations from cybercrime. Cyberdefensie offers services such as risk analyses, attack plans, and identifying and resolving security risks in websites. | Information Technology → IT Security 980 | penetration testing 43 risk analysis 217 cybersecurity 688 | |
| cybernuts.nl | CyberNuts | The company offers a variety of services, including consultancy, penetration testing, and compliance with regulations. CyberNuts has a team of specialists in various fields, such as cybersecurity, legal affairs, and digital marketing. The organization collaborates with various partners and stakeholders, including non-profit organizations, companies, and creative agencies. | Information Technology → Data Management 827 | digital marketing 176 cybersecurity 688 legal 937 consulting 3639 | |
| youriot.nl | MTF International BV | YourIoT provides contact information via telephone and email. The company develops products, Y-Connect and Y-Secure, specifically designed for the secure use of IoT devices. IoT is described as a network of smart, communicating objects that collect and exchange data, and control devices in the physical world using digital technology, with a significant impact on various sectors. | Information Technology → Business IT 102 | iot 183 equipment 4143 data 5872 security 6655 network 11123 | West-Betuwe → Stationswijk 649 |
| 4sysbv.nl | 4SYS | 4SYS is a new company focused on railway safety and track cabling, drawing on experience gained with railway contractors and engineering firms. The company provides project-based support, organization, and execution of cable and railway safety projects, emphasizing safety, risk management, and a proactive approach. 4SYS offers services such as project management, contract management, and preparatory work, with a focus on continuous improvement and strong teamwork, ensuring quality through in-house training. | Rail Services → Railways 181 | teamwork 497 risk 2896 safety 5819 training 28133 | |
| purple-cloud.nl | PurpleCloud | PurpleCloud operates with a flat structure and dynamic teams, possessing the expertise to guide clients through the complete migration to the cloud. In addition to migration, PurpleCloud offers management and security solutions to keep organizations safe. PurpleCloud supports businesses in designing, building, and managing secure cloud environments and provides temporary expertise for project staffing. | Software & Computing → Cloud Computing 1253 | cybersecurity 688 cloud 1527 consultancy 2596 innovation 4659 | |
| veilig-contactloos-betalen.nl | veilig-contactloos-betalen.nl | The website describes the increasing popularity of contactless payments while simultaneously highlighting the risks of data breaches by criminals using smartphones. The website provides an overview of the potential risks of contactless payments, such as the reading of bank cards and credit cards by criminal parties. The website describes how contactless payments work, with an explanation of the technology behind NFC and electromagnetic fields used. | | payment terminal 14 risk 2896 | |
| cyber-matters.nl | E-Vlotman Consultancy | The company offers custom web design and website maintenance services, both for websites they create and existing ones, at competitive rates. Cyber Matters utilizes WordPress, Elementor, and SEO to optimize websites for visitors and clients, and provides advice on cybersecurity. Cyber Matters is a part of E-Vlotman Consultancy and provides solutions for cybercrime, with a focus on security and adapting to the client’s needs. | | elementor 46 cybersecurity 688 wordpress 3551 seo 3707 webdesign 4092 maintenance 20093 | |
| cyberchef-dronten.nl | Cyberchef Dronten | The digitization of businesses presents risks, making entrepreneurs a target for cybercrime. Local municipalities, educational institutions, police, and other organizations in Dronten are collaborating to help entrepreneurs enhance their cybersecurity through Cyberchef Dronten. During the event, there will be discussions with IT students from Firda, security experts will give presentations, and a safety market with VR experiences and an anti-fraud team will be available. | Business Services → Collaboration 409 | cybercrime 87 cybersecurity 688 safety 5819 | Flevoland → Dronten 1667 |
| pentestfairy.nl | Pentest Fairy | The website describes ‘The Pentest Fairy,’ a person who places warning stickers on unattended laptops to prevent data leaks, identity theft, and vandalism. The ‘Pentest Fairy’ explains that a pentest, or penetration test, involves simulating an attack to identify vulnerabilities in a company’s security. The text highlights the common risk of leaving workstations unlocked and the potential consequences, including data theft, vandalism, identity theft, and malware infections, emphasizing the importance of locking laptops. | | pentest 17 vulnerability 149 sticker 221 laptop 1320 data 5872 security 6655 | |
| organisatiebedrijfsevenement.nl | Organisatie bedrijfsevenement | The website features articles about solar panels, including a guide to maximizing yield and profit, and introduces Huls Windenergies as a leading provider of sustainable energy solutions. It also includes articles on cybercrime prevention and how to deal with being a victim of cybercriminals. Furthermore, the website offers information on purchasing an office chair and focuses on career guidance via a link to RondomWerk. | Financial Management → SME 161 | cybercrime 87 sustainable energy 198 career guidance 210 office chair 225 solar panels 4701 | |
| rayandev.nl | RayanDev Solutions | The website introduces Rayan Amghar, an entrepreneur specializing in web development and offering various services for businesses. RayanDev’s services include web development, security solutions, and media management, along with parts distribution for the electric bike company Ouxi. The website features a portfolio, contact information, and details about completed projects and satisfied clients, emphasizing high-quality assets and custom solutions. | | security solutions 23 web development 965 | North-Holland → Amsterdam 41253 |
| zuidwest-it.nl | Zuid-West IT | Cyberattacks are a growing risk for organizations, with approximately one in five organizations being affected in recent years. Zuidwest IT tests the digital security of organizations using ethical hackers to identify and remediate vulnerabilities. The website addresses cybersecurity myths and provides information about cyber threats, and offers services such as application and network pentests and vulnerability scans. | Computer Science → Networking 809 | attack 31 vulnerability 149 application 3377 security 6655 software 8291 network 11123 | |
| jenoah.nl | Jenoah | Jenoah provides website design and development services, including hand-coded WordPress websites and custom solutions. The websites are designed with speed, security, and good Google searchability in mind. Jenoah, a web developer and designer based in Apeldoorn, helps small businesses establish their online presence and improve their search engine rankings. | | wordpress 3551 design 27202 | Gelderland → Apeldoorn 6996 |
| cybermonk.nl | Cybermonk | The website offers strategic advice and security audits to clients, with a commitment to providing clear responses regarding feasibility – either ‘can do’ or ‘can’t do’. Cybermonk provides services like migrations with zero downtime and resolves various IT cases, and offers discounted rates and free advice for nonprofit organizations. The site features inspirational quotes and emphasizes a relaxed approach to problem-solving, suggesting acceptance of potential difficulties and encouraging continued learning. | Software Development & Engineering → DevOps 429 | migration 349 compliance 506 security 6655 | |
| avgtrainingen.nl | AVG-trainingen | The website provides various training programs, including AVG training, catering to different sectors such as healthcare, business Netherlands, education, and government. Practical cybersecurity and privacy training is offered, with additional services including personalized phishing simulations and a Learning Management System (LMS). The organization offers full-service phishing simulations and a course to become a Privacy Officer for SMEs, and is open to inquiries via a contact form or phone. | Privacy → Data Protection 224 | phishing 34 lms 50 avg 145 simulation 241 sector 1332 training 28133 | |
| phishingveilig.nl | Phishing Veilig | The website explains that phishing is the most common form of cybercrime and that even organizations with strict security measures can be hacked. Phishing Veilig offers a consultation to identify weak points in organizations and implement a dashboard for monitoring phishing simulations. The platform utilizes artificial intelligence (AI) to create phishing simulations targeted at individual employees, followed by targeted assistance and training. | Insurance & Risk → Risk Management 1060 | phishing 34 cybercrime 87 simulation 241 email 1012 dashboard 1374 | |
| easywebsolution.nl | easywebsolution | The website regularly publishes news articles about various cybersecurity threats, including data breaches, hacking attempts, and ransomware attacks. It also covers topics such as marketing, e-commerce, web design, and technology, with articles on trends, AI, social media, and IT giants. The articles address issues such as the impact of AI, the future of events, and user experiences with various software and platforms. | | cybersecurity 688 e-commerce 738 ai 2181 data 5872 technology 6816 marketing 7107 | |
| securedd.nl | Securedd | The company's core offering, eSafe, is an online cloud storage portal where documents are privately accessible only to the intended recipient, utilizing encrypted storage and offering features like notifications and integration with existing document management systems. Securedd also offers GDPR-Direkt, a scalable solution for secure and compliant document exchange and storage, supporting internal and external data handling with auditing logfiles and automated communication. Furthermore, Securedd provides secure email solutions, including encrypted email, tracking, activity journals, and electronic signatures, compatible with popular email clients like Outlook and Gmail. | Business Software → Document Management 328 | encryption 50 portal 591 integration 1451 | |
| flexsites.nl | One Flexsites | The websites, known as Flexsites, are delivered within one week and are fully installed. They are based on the WordPress Content Management System, allowing users to manage and customize the content and design themselves. Flexsites offer features such as links for time registration, job postings, and applicant tracking, as well as integration with social media and Google Analytics. | Business Software → HR Management 30 | time registration 13 job postings 676 wordpress 3551 | |
| hackdewereld.nl | Hack De Wereld | The website provides information about the group's activities, including upcoming meetups and past event write-ups. Currently, the group organizes monthly online hacking meetups. HackDeWereld is a part of the broader Hack The Box meetup network, and members can join through their Meetup.com group. | Context → Community 57410 | meetup 67 netherlands 1376 blog 13392 | |
| wpveiliger.nl | WPveiliger | The website offers a security package with automated scans, updates, backups, and a firewall. The tool utilizes artificial intelligence (AI) to revert changes if updates cause problems. WPveiliger offers monthly subscriptions at a lower price than competitors, with features such as backups, malware scans, firewall protection, WordPress security, log recording, and admin protection. | Web Development → Content Management Systems 502 | firewall 51 backups 83 updates 200 ai 2181 wordpress 3551 security 6655 | |
| titanium24.nl | Titanium24 | The website outlines various cybersecurity services, including device security, backup & recovery, fire safety, surveillance cameras, forensic investigation, and incident management. The text emphasizes the increasing urgency of cybersecurity for businesses, referencing the risks of cyberattacks, such as data theft and financial losses. Titanium24 specializes in developing customized cybersecurity solutions tailored to the needs of clients and focused on protecting systems and data. | Administrative Support → Business Operations 1156 | attack 31 threat 62 cybersecurity 688 security 6655 | |
| novitam.nl | Novitam Consultancy | The website outlines Novitam Consultancy's services, which include commodity trading, renewable assets optimization, energy sales, and the implementation of renewable energy storage models. Novitam focuses on adapting sales organizations to changes in the dynamic energy and market landscape, leveraging expert knowledge in product and service implementation. The consultancy supports clients in achieving goals through projects related to financial and physical trading, risk management, and logistics, emphasizing the importance of technology and global connectivity. | Energy → Renewable Energy 1267 | renewable energy 77 risk management 543 trade 553 consultancy 2596 sale 5930 | Rijswijk → RijswijkBuiten 20 |
| itarroba.nl | IT Arroba | The company, originally Edlin automatisering, is based in Maastricht and offers a wide range of services, including cloud services, maintenance and monitoring, security and business networks. IT Arroba specializes in consultancy and security regarding IT and OT (Operational Technology) for SMEs and delivers and supports hardware and software, internet, cloud solutions, system management, application management, and web design. Furthermore, the company offers its own developed tools for security scans and has its own Technical Service, and is a partner of various software suppliers. | Software & Computing → Cloud Computing 1253 | cloud services 198 consultancy 2596 security 6655 software 8291 network 11123 maintenance 20093 | |
| princenbrouwerijen.nl | Ayyildiz Tim | Ayyildiz Tim was established in 2002 and conducts lobbying activities, primarily online, to respond to cyberattacks against Turkey. The organization's main goal is ‘statism,’ and they consider insults against Turkey and its institutions as an attack on national unity. Ayyildiz Tim aims to unite all Turks, from Edirne to Kars, under one umbrella and supports unity and solidarity, while striving to avoid racism. | Governance → Politics 5458 | cyberattacks 17 | |
| perca-si.nl | PERCA Security & Investigations | PERCA Security & Investigations is a recognized digital investigator, private detective, and security company, recognized by the Ministry of Justice and Security. The services offered include investigations into backgrounds, digital footprints, applicants, business relationships, and potential threats such as child extortion. The company emphasizes the importance of a solid suspicion before undertaking investigation services and provides privacy advice regarding the risks of non-compliance with privacy regulations. | Legal → Investigation Agencies 45 | detective 58 investigation 400 privacy 1286 security 6655 | |
| smitshoek.nl | Smitshoek (part of Microsmart) | The website provides processing services for accounting, primarily focused on freelancers and small businesses. Smitshoek.nl also offers cybersecurity solutions, including antivirus software and backup software, to protect business data. Microsmart, the underlying organization, specializes in the management of the business administration of small independent entrepreneurs and cybersecurity of ICT environments. | Legal & Administration → Business Support 488 | backup 494 cybersecurity 688 account 5781 administration 6587 | |
| infoprotect.nl | InfoProtect | The company identifies vulnerabilities in clients’ IT security through extensive testing and provides advice based on a risk analysis, outlining further steps. Before implementing security improvements, InfoProtect discusses the impact on the business operations of the end-users and ensures they accept the changes. The company offers targeted training to increase employee security awareness and advises on legislation and procedures regarding personal data, aiming to prevent identity theft. | Management → IT Strategy 185 | data 5872 security 6655 network 11123 training 28133 | |
| 4x9.nl | 4x9 Strategic and tactical advice | 4x9 primarily focuses on MKB companies in the logistics and warehousing sector and provides strategic and tactical IT consulting. In IT projects, it is crucial to first understand the underlying question and collaboratively find the best solution, taking business processes into account. The advisory practice focuses on coaching and training employees, setting up processes, and realizing added value through successful IT projects. | Information Technology → Business IT 102 | it 1539 question 2261 | |
| sunnyclouds.nl | SunnyClouds | The website outlines challenges companies face when moving their IT infrastructure to the cloud, including complexities in creating hybrid cloud architectures and adapting existing software solutions. SunnyClouds aims to simplify the cloud journey for businesses, focusing on making it understandable and feasible through expert guidance and consulting. The site highlights the importance of strategic work ('working smart') and transparency in achieving success within the cloud environment, alongside detailing the services offered and the background of the company's founder. | Software & Computing → Cloud Computing 1253 | cloud 1527 challenge 1697 architecture 3223 consulting 3639 | |
| experteer-blog.nl | N.V. | The Netherlands offers a wide range of possibilities for a sustainable existence, characterized by digital transformation, smart mobility and cultural renewal. Smart home systems are transforming Dutch households through automated solutions for lighting, climate control and security, creating an efficient and safe living environment. The Dutch public transport is evolving with electric buses and shared mobility solutions, supported by intelligent traffic management systems and the promotion of electric driving. | IT → Managed Services 720 | digitalization 757 mobility 1264 environment 4873 technology 6816 education 13471 sustainability 18451 | |
| trustwave.nl | Trustwave.nl | The website offers a range of services including cybersecurity assessments, compliance management, and secure collaboration tools. It features client testimonials highlighting the positive impact of Trustwave.nl’s services on cybersecurity, compliance, and team collaboration. The website also includes a blog with articles focused on digital security topics like productivity for entrepreneurs and turning ideas into profitable ventures. | Information Technology → IT Security 980 | compliance 506 assessment 1205 security 6655 blog 13392 collaboration 16036 | |
| omni-u.nl | Omni-U | Omni-U provides consultancy services to map out risks in information, IT, and privacy security and advise on appropriate measures. The website offers training courses, including CISM, CIPM, CCISO and CRISC, and support for obtaining certifications such as ISO 27001, BIO, and NEN 7510. Omni-U helps organizations find a balance between information security and employee productivity, and offers support in preventing security incidents. | Business & Management → Certification 364 | risk 2896 certification 3380 data 5872 security 6655 training 28133 | |
| intunesolutions.nl | Intune Solutions | The website offers a wide range of services, including managed security, automation and system management, cloud security, penetration testing, and security awareness training. Intune Solutions also provides products such as a web security scanner and email security, and offers specialized advice, including Security By Design and Incident Response Plans. The organization provides 24/7 support and monitoring, vulnerability management, and red/blue teaming services to prepare organizations for and respond to cyber incidents. | Security & Surveillance → Security Services 445 | vulnerability 149 incident 335 cybersecurity 688 test 769 monitor 1063 security 6655 | Flevoland → Dronten 1667 |
| cstechnologies.nl | Cloudspace Technologies | The company specializes in AWS Cloud Management, leveraging expertise in core AWS services and assisting clients with their cloud setups. Cloudspace Technologies also offers Oracle Cloud Management, assisting clients with migrations, re-hosting, and implementations of Oracle databases, middleware, and infrastructure. Furthermore, they provide website hosting and development services, catering to various website types and utilizing technologies like WordPress, Python, and PHP. | Software & Computing → Cloud Computing 1253 | aws 62 oracle 97 cloud 1527 hosting 3125 security 6655 | |
| secaw.nl | SecAw | The website offers a range of targeted online training courses that strengthen resilience against cybercrime. These courses cover topics such as phishing, ransomware, social engineering, and helpdesk fraud. SecAw.nl also offers articles and news on modern cybersecurity trends and best practices. | | phishing 34 ransomware 41 cybercrime 87 cybersecurity 688 training 28133 | |
| cybersecurity24x7.nl | Trustwave | The website offers smart cloud solutions without worries and Trustwave MTDR pentesting vulnerability management services, focused on detecting, containing, and eradicating threats. The company provides various penetration testing services, including Pen Testing as a Service, network security, application and product security, and Red and Purple Team exercises. Trustwave’s SpiderLabs team delivers research and insights to proactively protect customers, and introduced in 2022 the Enterprise Pen Testing service for large organizations requiring in-depth testing. | Real Estate → Enterprises 162 | threat 62 cloud 1527 research 8967 | |
| detassenkoning-xxsnel.nl | Ministraitor | The site features a selection of videos covering various topics within infosecurity and hacking, including presentations and discussions from conferences. A significant portion of the content revolves around Hack Glasgow 2025, with multiple videos detailing specific talks and sessions on topics like geopolitics, data privacy, phishing, and ethical considerations in cybersecurity. Additionally, the site includes coverage of BSides Prague 2025, showcasing a diverse range of presentations on topics like smart cities, DNS security, IoT hardware hacking, and digital marketing abuse. | Information Technology → IT Security 980 | hack 36 cybersecurity 688 conference 763 video 6714 | |
| digitalguards.nl | DigitalGuards | The company offers various services including phishing tests, vulnerability scans, and penetration tests for both traditional and cloud infrastructure. DigitalGuards is composed of a team of ethical hackers with in-depth knowledge and experience in cybersecurity. The company emphasizes the need for proactive measures to prevent cybercrime and offers customized advice to clients. | Information Technology → IT Security 980 | vulnerability 149 testing 456 approach 971 infrastructure 1460 security 6655 | Overijssel → Hengelo 3499 |
| bythewww.nl | By the WWW | The bureau, founded in 2011 by Koen Schuit, specializes in building websites with WordPress and utilizes plugins and themes. WordPress is an open source content management system (CMS) that began with limited code and has grown to become one of the largest projects on the web. The company, 'By the WWW', also produces consumer electronics under the brands Salora and WLA, with a long history (more than 80 years) in the European market. | | plugins 123 electronics 971 wordpress 3551 theme 4015 design 27202 | North-Holland → Haarlem 8674 |
| ults.nl | UnlimiTech Solutions | The website describes UnlimiTech Solutions as a partner for digital growth, offering personalized and tailored services. The services encompass custom solutions for operational efficiency, cost reduction, and new opportunities within AI, cybersecurity, data entry, and software development. UnlimiTech Solutions emphasizes a proactive approach, transparency, and reliability in its service delivery, focusing on client goals and compliance with regulations. | Information Technology → Data Management 827 | software development 358 cybersecurity 688 ai 2181 | |
| betty-jo.nl | Betty Jo | Betty Jo provides coaching programs such as ‘Map yourself out’, ‘Mindset reset’, ‘Relax & reflect’, ‘Learn to profile’, and ‘Stay balanced’ to help women in the IT sector develop their qualities and grow. The website also includes workshops on ‘Influence & Power’ and a blog with articles on current themes for women in IT, self-awareness, and personal development. Betty Jo, named after Elizabeth J. Feinler, the inventor of the DNS protocol, has created a platform to support women in the IT sector and inspire young girls to choose this field. | Science → Computer Science 2413 | mindset 782 it 1539 blog 13392 workshop 19325 coach 25810 | |
| dutchtechgroup.nl | Dutch Tech Group | The organization believes in collaborative creation between individuals and organizations to generate new strategies, business models, and products. Dutch Tech Group connects stakeholders within a dynamic tech ecosystem, serving enterprise customers, government, and solutions providers. They achieve this through events, projects, and industry knowledge, concentrating on sectors like Blockchain, Data Science/AI, Enterprise Mobility, and IoT. | Data Analysis → Business Intelligence 1002 | iot 183 data science 193 blockchain 250 mobility 1264 strategy 9379 event 45199 | |
| cybersecuritytechpublishhub.nl | Cyber Security Tech Publish Hub | The website provides an overview of various cybersecurity topics, including cloud security, API security, data security, and network security. Various whitepapers from companies in the industry are presented, ranging from Cloud Cyber Resilience to how to leverage Office 365 for a zero trust strategy. The site also offers information on tools and services such as Endpoint Protection, Data Loss Prevention, and Identity and Access Management, alongside various security-related training courses. | | whitepaper 116 cloud 1527 data 5872 security 6655 network 11123 | |
| ongestructureerdedata.nl | SLTN | The website highlights the challenges of rapidly increasing unstructured data in the M&E sector and the need for effective management and security. SLTN’s digital media storage and solutions help M&E companies achieve high-performance creation and real-time workflows. The website offers a whitepaper with tips for an overviewable management of unstructured data and promotes a consultation with experts. | Cloud Computing → Cloud Storage 29 | data security 20 whitepaper 116 workflow 407 medium 1293 data 5872 | North-Holland → Hilversum 4397 |
| uwidealecybersecurity.nl | Your Ideal Security | The website presents multicloud solutions, Microsoft 365 Backup and DraaS/Zerto, allowing companies to secure their data and systems. A key component is a cybersecurity survival guide that provides guidelines for preventing and mitigating ransomware attacks and other cyber threats, with special attention to the challenges of the current remote working environment. The website offers opportunities for a Cyber Security Scan and personalized advice, to help companies identify their vulnerabilities and improve their security strategy. The main motives behind cyberattacks are financial gain, data breaches, fraud, and reputational damage. | Information Technology → IT Security 980 | ransomware 41 cloud solutions 281 cybersecurity 688 scan 790 data 5872 | |
| ciso-coach.nl | CISO Coach | The company offers programs lasting 3, 6, and 12 months, where participants receive intensive one-on-one guidance from an experienced CISO. The coaching focuses on assisting with questions, defining a position, and achieving specific goals, resulting in more time for CISO tasks and improved security maturity. The website offers online support and one-on-one sessions with a CISO, providing practical tools and professional advice. | Technical → Security 408 Technology → IT 3337 | question 2261 risk 2896 security 6655 strategy 9379 | |
| security30.nl | SECURITY30.NL | The service offering includes various ‘as a Service’ options, such as CISO as a service, Cyber Supply-chain as a service, and ABDO / NIST as a service. SECURITY30.NL provides additional services including security managers, awareness programs, risk management, and strategic reporting. The website focuses on achieving compliance with various regulations like ISO27000 and NIST. | Technical → Security 408 | compliance 506 cybersecurity 688 risk 2896 | |
| 365cyberwatch.nl | 365 CyberWatch | The company offers 24/7 security monitoring based on a zero-trust principle and defense-grade security. They provide specialized SOC services for the manufacturing industry, focused on compliance with regulations such as NIS-2 and IEC 62443, and for the defense industry and suppliers, taking into account specific requirements. Security monitoring for the manufacturing and defense industries requires a specific approach due to the complexity of the environments, including OT, IoT, and legacy systems. | Security & Surveillance → Security Services 445 | soc 10 defense 121 manufacturing 396 monitor 1063 security 6655 | |
| mickcomict.nl | Mickcom ICT | The company offers a range of services including cloud security, computer security, network security, and cybersecurity training. Mickcom ICT specializes in the security of email, M365, and other cloud platforms, as well as in detecting and preventing network intrusions. In addition to security services, Mickcom ICT provides backup, disaster recovery, and IT migration services, and prioritizes a customer-centric and reliable service. | IT → Managed Services 720 | backup 494 cloud 1527 security 6655 network 11123 | |
| bitsupport.nl | BIT Support | BIT Support offers a wide range of services, including email security, firewall management, WiFi management, Mobile Device Management, security awareness, and monitoring, as well as device security. The website emphasizes the concept of ‘well-managed IT’ and the benefits of fixed subscriptions for IT management, without extra costs or complications. BIT Support strives for direct accessibility, fast service, and the delivery of the right equipment and tools, together with data security and regular updates and backups.” | IT → System Management 272 | firewall 51 it 1539 subscription 3287 data 5872 security 6655 | |
| cybermonitoringservice.nl | d-Fence | The company highlights that hackers frequently target SMEs due to a lack of specialized knowledge and resources. The Cyber Monitoring Service is an affordable, automated solution that detects anomalies and alerts, utilizing proven open-source techniques. The service actively monitors a company's entire digital environment, including the office environment, locations, and online identity and websites. | Insurance & Risk → Risk Management 1060 | attack 31 detection 128 alarm 377 domain 1811 | |
| korium.nl | Korium.nl | The website explains what programming work entails, including the development of websites, apps, and backend systems. Korium.nl offers various ICT solutions, including network management, cloud migrations, cybersecurity, and workplace management, tailored to organizations. The site describes cybersecurity as a necessity to protect against cyberattacks and data breaches, and introduces Microsoft 365 as a cloud solution with various functionalities such as Office apps, OneDrive, Teams, and Exchange. | Software & Computing → Cloud Computing 1253 | cloud migration 21 it consulting 61 network management 235 microsoft 365 430 cybersecurity 688 collaboration 16036 | |
| ssatb.nl | Xellentis & Risk Advies | The organization of the Security Summit @ The Beach is a ‘hobby’ initiative led by Marco Koelmans and Theo Sinnema. Over the past three editions, speakers with engaging stories and a pleasant location have been offered. The organization is looking at new initiatives and can be followed via a Twitter account. | Events → Conferences & Meetings 5381 | conference 763 networking 842 speaker 1481 sponsors 2642 event 45199 | |
| zenasecurity.nl | Zena Security | The website focuses on preventing data loss and preserving client trust through comprehensive cybersecurity solutions. A free initial consultation is offered, covering data inventory, risk analysis, and compliance, to help businesses assess and mitigate cybersecurity threats. Zena Security provides a range of services including cloud implementations, multi-factor authentication, data loss prevention, and staff education, all tailored to the latest security best practices. | Financial Services → Compliance 399 | risk analysis 217 compliance 506 cybersecurity 688 consulting 3639 data 5872 | Limburg → Maastricht 6008 |
| around-ict.nl | Around ICT | Around ICT sets up and manages IT environments based on Microsoft 365, ensuring that programs and email are up-to-date and secure. The company provides security awareness training, aiming to prevent human errors that lead to access by criminals. Around ICT integrates fixed and mobile telephony, hardware, and telephony subscriptions for its clients. | Business Software → Cloud Solutions 82 | microsoft 365 430 telephony 494 ict 1049 security 6655 | |
| cybersecuritysoftware.nl | CyberSecuritySoftware.nl | The website offers extensive reviews of antivirus, firewall, and anti-malware software, focused on protecting computers, tablets, smartphones, and iOS devices against online threats. The article compares various software options, including TotalAV, Bitdefender, and Kaspersky, highlighting their specific features and benefits. The website offers discounts and free trial versions of the reviewed software, and describes the benefits such as malware detection, ransomware protection, and VPN functionality. | | antivirus 74 cybersecurity 688 protection 728 software 8291 | |
| d-fence.nl | d-FENCE | Today’s digital world is filled with sensitive information and constantly connected to the internet, increasing the need for protection. d-FENCE provides a comprehensive security solution, including 24/7 monitoring, risk analysis, and leveraging expert partners. The solution detects suspicious activity immediately and offers complete protection for a company’s digital environment, including offices, websites, and online reputation. | Real Estate → Enterprises 162 | monitor 1063 domain 1811 risk 2896 environment 4873 security 6655 | |
| intercms.nl | Safe Online | The website provides guidelines for recognizing phishing emails, creating strong passwords, and securing smart devices. It offers advice on protecting personal data on social media and preventing fraud during online payments. The website emphasizes the need for awareness and simple steps to ensure a safer online experience, including statistics on cyberattacks. | Security Systems → Internet Security 22 | phishing 34 cybercrime 87 password 213 data 5872 software 8291 | |
| jitsolutions.nl | JIT Solutions | The company offers services in the areas of IT projects, consultancy, and web development/hosting. JIT Solutions also provides storage solutions, including network and cloud storage with backups, and manages clients' network infrastructure. Furthermore, JIT Solutions supports with technical skills such as HTML/CSS, Python, Linux and CI/CD, and also offers services in the area of advertising and branding development. | Software & Computing → Computing 696 | it projects 22 data analysis 211 webhosting 948 infrastructure 1460 advertising 2302 consultancy 2596 | |
| kalf-ict.nl | Kalf ICT Services | The company aims to create reliable and secure ICT environments with a single point of contact for clients, managing the total ICT infrastructure. Kalf ICT offers solutions for continuity, cybersecurity, backups, and system management, and helps clients with various ICT questions and the selection of new software. The company has a diverse customer base ranging from individuals to large SMBs, and operates nationally and internationally. | IT → System Management 272 | business network 21 backups 83 continuity 128 cloud solutions 281 system management 431 cybersecurity 688 | |
| modernsecurity.nl | Modern Security | The website focuses on various Microsoft Defender products, including Defender for Cloud Apps, Defender for Endpoint, Defender for Identity, Defender for Office 365, and Defender XDR, along with Microsoft Sentinel. Content includes articles and guides on topics like Selective Isolation in Defender for Endpoint, integrating Microsoft Defender EASM with Exposure Management, and automated remediation with Defender for Office 365. The site also covers broader security categories such as compliance, identity management, and general security best practices, demonstrating a comprehensive approach to digital protection. | Financial Services → Compliance 399 | compliance 506 security 6655 | |
| nis2.nl | Global Secure | The website offers guidelines and support for cybersecurity compliance, focusing on the new requirements. Global Secure, the owner of the website, provides complete cybersecurity and compliance services, including support and long-term relationships. The website regularly publishes news articles and information bulletins about cybersecurity, ISO 27001, NIS2, and DORA, including previews of new information bulletins. | Legal → Legal Issues 56 | dora 15 iso27001 22 nis2 27 cybersecurity 688 presentation 1785 event 45199 | |
| s10group.nl | S10 group | The organization provides Ransomware protection and Master Data Management solutions, including a unique ‘Last Line of Defence’ (LLoD) solution to prevent encryption outbreaks and combat ransomware attacks. The website promotes turn-key industrial IoT solutions, including track-and-trace technology, for sectors such as factories, hospitality, warehouses, and retail, focused on improved safety, productivity, and efficiency. S10 Group offers data integration solutions using ELT and AI to create ‘golden records’ and deliver ‘up-to-date’ datasets for analysis, particularly with Microsoft Azure integration. | Information Technology → Data Management 827 | ransomware 41 iot 183 data 5872 security 6655 | Teylingen → Sassenheim 599 |
| securesense.nl | Secure Sense | Secure Sense offers a variety of services, including security checks for websites, networks, and mobile apps, audits of internal infrastructure, and training for employees on digital security. The services focus on identifying security vulnerabilities, reducing the risk of data breaches, and complying with regulations such as the GDPR (General Data Protection Regulation). The company emphasizes a proactive approach, continuously scanning the environment and attempting to identify vulnerabilities before they can be exploited. | Information Technology → IT Security 980 | vulnerability 149 audit 622 risk 2896 data 5872 security 6655 training 28133 | |
| simlinc.nl | Simlinc | The platform offers a unified solution for alarm transmission, video verification and surveillance, complying with relevant European standards such as EN:50518, EN:50136 and EN:50600. Simlinc develops and delivers AMS and PSIM software as a Cloud-based service (Software-as-a-Service), focused on solutions for retail, logistics and transport. The website provides integration of IoT, AI, VoIP and Push-to-Talk services, including camera APIs and control APIs, and promises cost savings, efficient workflows and reporting. | Tracking Systems → Trace 29 | iot 183 cloud 1527 security 6655 video 6714 | |
| tltd.nl | Tilted | The company offers a range of services including design, development, hosting, and consulting, with a strong focus on Ruby on Rails. They have experience across various industries and project sizes, from small startups to large multinational corporations. Recent projects demonstrate their capabilities in areas such as certificate management, SaaS development, and website re-implementations, consistently meeting tight deadlines and utilizing new technologies. | Information Technology → IT Security 980 | saas 131 rail 199 certificate 1036 consulting 3639 app 4595 | |
| tombartels.nl | Tom Bartels | Tom Bartels describes himself as an experienced web developer with up-to-date knowledge and a passion for the field, having been involved in ICT since a young age. Since 2013, he has worked as an ICT Trainer, using relevant and up-to-date learning materials to teach students the latest techniques and skills. Tom Bartels has experience training a diverse range of students, including individuals seeking career changes and young adults with barriers to employment. | | web development 965 trainer 1966 student 7623 | |
| 3dprintsafe.nl | 3D Printsafe | The website investigates the safety and health risks associated with the increasing use of various 3D print technologies. The project aims to strengthen the safety culture throughout the entire 3D printing process chain for businesses. The website offers a toolbox with practical measures, best practices, policy input, and educational materials to promote safe 3D printing. | Manufacturing → 3D Printing 565 Software Development & Engineering → Technology Companies 29 | toolbox 124 3d printing 332 risk 2896 knowledge 3528 safety 5819 | |
| acs-assurance.nl | ACS Audit & Assurance | The company has more than 25 years of experience in conducting audits and providing assurance. ACS Audit & Assurance is impartial, independent, and expert, specializing in areas such as ISAE 3000 and 3402, DigiD audits, SOC Cyber Security Risk Framework, and data quality. The company offers both investigation services, training, and consulting, leveraging their expertise and industrial knowledge. | Financial Services → Compliance 399 | assurance 24 data quality 33 risk management 543 audit 622 cybersecurity 688 training 28133 | |
| alexvanwolferen.nl | Alex van Wolferen | Alex van Wolferen is a Sitecore Architect and MVP, recognizing his expertise in the field with awards in 2018, 2021, and 2022. The blog addresses issues with the Azure CLI and provides troubleshooting steps, including guidance on mitigating CVE-2021-45105 and CVE-2021-44228 related to the Log4j vulnerability. Recent posts detail PowerShell scripts and updates for Sitecore SOLR installations, offering solutions for vulnerabilities and promoting software upgrades. | Software Development & Engineering → App Development 1084 | powershell 47 | |
| allthecyberladies.nl | All the Cyber Ladies | The website offers podcasts featuring interviews with diverse women in the IT and cybersecurity sector, including Hanna (with a background at the AIVD/MIVD), Rosalie Brand (providing legal assistance to hacked organizations), Frederiek Burlage (public-private collaboration with the police), and Ouissal Touhaf (ethical hacker at BDO CyberSecurity). In addition to podcasts, All the Cyber Ladies has a shop selling merchandise such as pink socks, sportswear, and hoodies, sold by the organization Roze Sokken Cyber Ladies. The website also contains a blog with news and insights, including a retrospective on the first two years of the podcast and information about networking events, such as the event on March 7, 2021, organized in collaboration with Women4Cyber and the Municipality of The Hague. | Social Organization → Networking Organizations 475 | networking event 61 cybersecurity 688 merchandise 1061 it 1539 podcast 3328 | South-Holland → The Hague 19898 |
| alterit.nl | Alter IT | Alter IT provides a range of services, including support, security, cloud integration, and the complete outsourcing of IT tasks ('ontzorgen'). The company emphasizes finding specific solutions for the customer and prioritizing the customer in all its processes. Alter IT has been active since 2001 and strictly adheres to regulations, such as the AVG, regarding personal data. | Business Software → Cloud Solutions 82 IT → Management 346 | cloud 1527 it 1539 security 6655 | South-Holland → Delft 5309 |
| anoniemonline.nl | Anoniemonline.nl | The website offers articles on topics such as VPNs, torrent sites, the Dark Web, ransomware, and identity theft. A key component of the website is a section with VPN reviews and explanations about VPNs. Anoniemonline.nl also covers topics related to online safety and accessing content, such as watching Videoland abroad. | Security → VPN 54 Radio & Communication → Networks 341 | vpn 167 privacy 1286 internet 1678 review 1888 article 6000 security 6655 | |
| anti-fraud.nl | Anti-Fraud Innovation Lab | The lab employs a human-centered, collaborative, interdisciplinary, and iterative approach, utilizing research, prototyping, and visualization tools to develop fraud-free experiences. Their services include researching fraud and corruption, designing systems that are resistant to manipulation, and investigating fraud cases to produce independent reports. The organization's process begins with understanding user needs, followed by research into the fraud ecosystem and culminating in idea generation to explore innovative anti-fraud solutions. | Financial Services → Compliance 399 | fraud 200 innovation 4659 research 8967 design 27202 | |
| antwoordenenvragen.nl | Jacques Handelé Antwoorden & Vragen | The website introduces Jacques Handelé as an expert in his field, with the quote: ‘I believe that a question can sometimes be more helpful than an answer.’ Jacques Handelé offers his services as a consultant, process facilitator, moderator, and coach, focusing on promoting communication and development within organizations and teams. He has experience in the public sector (municipalities, provinces, state) and emphasizes the importance of good questions and answers, as well as active listening during meetings. | | question 2261 meeting 2381 communication 10162 | |
| avgdirekt.nl | SECUREDD | AVG-DIREKT offers a solution for secure communication and file exchange, protecting businesses from data leaks. The platform enables the exchange and archiving of data with clients, without requiring specialized knowledge, and guarantees data privacy. AVG-DIREKT is based on a cloud solution managed by SECUREDD, and integrated with existing IT systems. | Business Software → Document Management 328 | authentication 48 files 290 folder 300 data 5872 communication 10162 | |
| b00z.nl | Onno van der Leun | The author, Onno van der Leun, is troubleshooting a Sophos UTM 9.4 cluster that is failing to synchronize after migrating VMs to a new Hyper-V cluster. A two-node Sophos UTM 9 HA cluster was previously running successfully and migrated without problems. However, after booting the migrated slave node, it began reporting the presence of another slave and lost heartbeats. Log messages indicate conflicts related to slave nodes and lost heartbeat communications, suggesting a synchronization issue during the migration process. | Computer Science → Networking 809 | hyper-v 12 heartbeat 15 synchronization 42 migration 349 | |
| baetencybersecurity.nl | Baeten Cybersecurity | Baeten Cybersecurity offers various solutions, including a personal security package, a monitoring journey and a cybersecurity quickscan. The company offers advice and a free consultation to help organizations improve their online security, focusing on preventing ransomware attacks. Ransomware attacks lead to significant financial damage, disruption of operations and reputational damage. The website emphasizes that human error is often the cause of cyberattacks. | | ransomware 41 quickscan 134 cybersecurity 688 | |
| barracudaexpert.nl | Barracuda Professional Services Expert | The website offers various Barracuda products and services, including email security gateways, firewalls, application security, and backup solutions. The company specializes in managed security services, providing 24/7 support, management, and implementing advanced security measures. Barracuda Essentials protects, manages, and secures Office 365, offering protection against cyberattacks and compliance with AVG/GDPR. | Security & Surveillance → Security Services 445 | firewall 51 managed services 95 backup 494 security 6655 | |
| be-prepared.nl | BE-PREPARED – Security Systems | BE-PREPARED focuses on securing IT systems in companies, reducing the risk of cyberattacks. The website describes the increasing prevalence of cyberattacks and the need for security, with predictions for the coming years. BE-PREPARED offers a comprehensive approach to security, including technological solutions and optimizing internal processes, to create a safe working environment. | IT → Managed Services 720 | ransomware 41 it infrastructure 84 cybersecurity 688 security 6655 | Drimmelen → Made 335 |
| beterit.nl | Hersenspinsels | The website covers topics such as the electric transition, the possibility of a centralized European digital bank, and the dangers of electrification. It also presents articles about applying for IT jobs, change management, and news about events in the Netherlands, including the withdrawals of political parties from a presentation. In addition to news and articles, the site also deals with tech-related topics such as cyberattacks and the neutralization of the Qakbot botnet. | | electrification 18 politics 1259 it 1539 news 15293 | |
| binksecurity.nl | Bink Security | Bink Security offers a wide range of services, including penetration testing, phishing simulations, security advice, and training, with a focus on helping organizations with their security challenges. The website emphasizes a proactive and understandable approach to cybersecurity, with a focus on providing practical guidance and identifying cybersecurity risks. Bink Security also offers customization options and contributes to compliance with regulations such as DORA and ISO 27001, and actively identifies and manages cybersecurity risks through audits and analyses. | Information Technology → IT Security 980 | penetration testing 43 audits 158 compliance 506 risk 2896 security 6655 training 28133 | South-Holland → Rijswijk 2054 |
| blackboxblue.nl | BlackboxBlue | Companies are increasingly required to proactively manage their own risks, driven by insurers’ decreasing willingness to cover significant risks and stakeholder pressure. Criminals conducted 147 successful ransomware attacks on large Dutch companies last year, leading to business downtime and significant damage. BlackboxBlue has over 25 years of experience in risk management, particularly in property risk engineering, cyber security, and industrial automation, offering expertise to insurance companies and businesses. | Insurance & Risk → Risk Management 1060 | continuity 128 risk analysis 217 insurer 446 cybersecurity 688 risk 2896 | |
| blackchamber.nl | BlackChamber | The website offers information about cyber security risks and the need for protection. BlackChamber offers various services including an Organization Security Check and Cybersecurity as a Service, focusing on advice and expertise. The organization emphasizes that cybersecurity is essential for all businesses, regardless of size, to prevent damage from cyberattacks and data theft. | Radio & Communication → Telecommunications 1361 | cybersecurity 688 protection 728 risk 2896 security 6655 | |
| blueidentity.nl | Blue Identity | The company offers services such as vulnerability assessments, 24/7 SOC, cybersecurity consultancy, quarterly checks, and data optimization. Blue Identity specializes in securing companies in Microsoft and Azure environments, with advanced security and continuous monitoring. The website offers a cybersecurity check, case studies, and information about the services and the benefits of BlueGuard, such as implementing robust digital security and setting up an effective incident response plan. | Information Technology → IT Security 980 | microsoft 365 430 cybersecurity 688 plan 2566 risk 2896 data 5872 security 6655 | |
| bluepaper.nl | BluePaper | BluePaper has over 15 years of experience in IT audit, risk, compliance, and ICT talent placement, offering innovative solutions in these areas. The company specializes in IT audit, IT Risk Management, information security, and compliance, particularly for the public and education sectors, providing strategic and tactical support. BluePaper combines training programs with tools to support professionals in these areas, improve skills, and connect talent with assignments, collaborating with companies like Sollicitatiezaak and Cyber Guard Solutions. | Staffing & Recruitment → Temporary Staffing 1003 | compliance 506 audit 622 assignment 1121 risk 2896 talent 3987 technology 6816 | |
| briljan.nl | BrilJan | The website outlines the importance of thorough market research, emphasizing the need to filter information for objectivity and factual knowledge. It details common areas of market research investigation, including identifying market trends, analyzing competitors, and assessing SWOT analyses. The site’s founder, Jan Schepers, shares his background as a researcher with extensive experience across various industries and highlights his collaborative approach to larger projects. | Research → Research Methodology 80 | market research 163 researcher 220 trend 1865 risk 2896 competition 4759 strategy 9379 | |
| chvv.nl | CHvV | The website provides information on various services including authentication, certification, cybersecurity legislation, privacy compliance, and data management. CHvV regularly publishes blogs and news articles on topics such as privacy, cybersecurity, and the potential application of IoT devices in healthcare. The company emphasizes its extensive experience in the sector and its expert team involved in projects, procurement, and providing advice on ICT, privacy, and procurement law. | Information Technology → IT Security 980 | information security 217 procurement 493 cybersecurity 688 privacy 1286 project management 3423 technology 6816 | |
| cloudict.nl | Cloud ICT | The company offers IT management services, taking responsibility for all aspects of the client's IT systems, including systems, vendors, updates, and cost savings. Cloud ICT provides cybersecurity solutions to protect businesses' systems from threats, and also offers support with compliance requirements such as AVG, NIS2, and ISO27001. The company offers IT development services, such as creating custom websites and workflows, as well as training courses on IT topics, including AI and blockchain. | | it 1539 security 6655 training 28133 | North-Brabant → Bergen op Zoom 2274 |
| consultancy4you.nl | Consultancy4you B.V. | Victor de Pan describes his expertise in (Cyber)security, including knowledge of ISO standards, the Attack Mitre model, and NIST. He is currently working as a SharePoint specialist, with a focus on SharePoint, Cyber security, and Office 365. Victor de Pan is pursuing a Master's degree in Cyber Security Engineering to stay up-to-date on the latest security threats and integrate them into his work. | Information Technology → IT Security 980 | sharepoint 83 office 365 135 knowledge sharing 162 cybersecurity 688 | |
| cosol.nl | Cosol Corporate Solutions | The website describes Cosol’s approach to delivering cyber security services, emphasizing collaboration with partners and providing independent advice. Cosol helps organizations identify their specific ICT challenges and determine the appropriate solutions and processes, starting with an assessment of their current security posture. The company highlights the importance of mutual trust and clear communication in cyber security, with the goal of achieving the best result for the client. | Technology → IT 3337 | cybersecurity 688 partner 4272 data 5872 security 6655 | |
| custodian.nl | Custodian B.V. | The website offers a range of security services, including SIEM-as-a-Service (using Google Chronicle), Vulnerability Management (using Tenable), and Managed SOC solutions. Custodian highlights its years of experience in the industry and provides consultancy services to assist clients with comprehensive security and compliance. Recent blog posts cover topics such as Zero Trust Assessments, Tenable certifications, and Custodian's partnership with Tenable. | Computer Science → Software Engineering 404 | chronicle 25 consultancy 2596 | |
| cyberbeveiligingstoolkit.nl | DTX and Bluebird & Hawk | The toolkit combines governance and IT best practices to quickly achieve compliance. It offers a wide range of policy documents, manuals, and templates for IT and technology. Furthermore, the toolkit provides full support and training throughout the implementation. | Municipalities → Governance 1043 | dora 15 nis2 27 template 742 policy 2149 | |
| cyberbewustwording.nl | BlackboxBlue | Cyber incidents often arise from human errors, such as using infected USB sticks or failing to recognize phishing emails. It is essential to make cybersecurity an integral part of the company culture, encouraging the reporting of incidents and learning from mistakes. BlackboxBlue supports companies in creating a safe culture through e-learning training that raises employee awareness of risks and teaches safe behavior. | Information Technology → IT Security 980 | incident 335 risk 2896 culture 3922 employee 4429 training 28133 | |
| cybermentor.nl | Cybermentor | Cyberattacks are increasing, and regulations are becoming stricter, causing concern for entrepreneurs, especially during mergers and acquisitions, regarding cybersecurity. Cybermentor offers tailored packages with clear monthly fees and flexible guidance based on a pay-per-use model. The team of Cybermentors provides various services, including penetration testing, policy advice, selection of security specialists, and support in building their own security team. | Information Technology → IT Security 980 | cybersecurity 688 risk 2896 package 6112 | |
| cybersecuritygenius.nl | Cyber Security Genius | The website emphasizes that cybersecurity is no longer an optional agenda item, given the increasing digitalization and the risks of internet crime. It explains that SMEs often fall short in cybersecurity due to a lack of time, resources, and focus, unlike larger companies. The website presents a three-step plan for improving cybersecurity posture, starting with a 30-minute assessment to determine a cyber risk score. | Information Technology → IT Security 980 | integrity 205 cybersecurity 688 assessment 1205 risk 2896 security 6655 | |
| cysecc.nl | Cyber Security Council (CYSECC) | CYSECC strives to contribute to the strengthening of the Dutch digital society through cooperation, knowledge development, and exchange, promoting security, transparency, stability, and resilience. Due to the interconnectedness of ICT structures and the overlap between public and private aspects in the cybersecurity domain, constructive dialogue and collaboration between organizations with shared interests is essential. CYSECC addresses the fragmentation in the Dutch and international digital landscape by fostering sustainable relationships and implementing integrated strategies, and works with partners to tackle digital issues at various levels. | Relationships → Partnerships 481 | cooperation 433 cybersecurity 688 partner 4272 strategy 9379 | |
| datalekkenapp.nl | Datalekken App | The website focuses on Dutch legislation regarding data breaches, which has been in effect since 2016 and obligates companies to ensure the security of personal data. To assist users, the website offers the Datalekken App, which allows for a quick assessment of a system’s security status. The website also includes interviews with hackers Melvin and Olivier, who provide concrete examples of the causes and consequences of data breaches, including configuration errors and vulnerabilities in software. | Privacy → Data Protection 224 | data breach 16 risk 2896 app 4595 security 6655 software 8291 | |
| decyber.nl | Peter Zinn | The book ‘De Cyber’ discusses the origins of the current cyber world and how digital crime develops. Peter Zinn, the author and speaker, shares 10 cybersecurity tips and gives presentations and training sessions on the topics. The website provides background information on Zinn’s experience in cyber security and the presentations he delivers. | Literature → Non-Fiction 519 | cybercrime 87 cybersecurity 688 story 8285 | |
| devcru.nl | DevCru Web Services Agency | The website highlights DevCru's expertise in web development and cybersecurity, emphasizing the creation of user-friendly and visually appealing digital experiences. DevCru offers a wide range of services including web design and development, mobile app development, e-commerce development, and custom application design, catering to businesses of all sizes. With over 12 years of experience, DevCru aims to protect and elevate businesses’ online presence and drive conversions through tailored solutions. | Information Technology → IT Security 980 | asset 591 cybersecurity 688 web development 965 | South-Holland → Zoetermeer 4046 |
| dp-pmce.nl | dP Project Management & Consultancy | The company boasts over 20 years of experience and specializes in areas such as onshore and offshore wind energy, biomass power plants, underground gas storage, and high voltage grids and substations. dP’s goal is to optimize client businesses and projects by utilizing their extensive expertise. Contact information includes an address in San Francisco, California, and a Dutch phone number and email address for inquiries. | Energy → Renewable Energy 1267 | renewable energy 77 risk management 543 consultancy 2596 project management 3423 | Zeeland → Tholen 863 |
| eidas-vertrouwensdiensten.nl | House of Trust B.V. | The company assists clients with the setup and certification of eIDAS trust services, and offers guidance towards ETSI certification and the setup of public key infrastructure. House of Trust B.V. is itself a Dutch QTSP and has experience in building and certifying such services, providing expertise in this field. The website offers various tools, articles, and guidance related to eIDAS trust services, ID wallets, and electronic identification, and answers questions about QTSPs, TSP's, and relevant legislation. | Information Technology → IT Security 980 | | |
| elasticore.nl | Arjan Neef | Arjan Neef began programming at a young age and has developed a diverse skillset encompassing databases, website building, cybersecurity, and artificial intelligence. He transitioned from software development to test management, driven by a desire to create tools that enhance productivity and alleviate tedious tasks for others in the workplace. Neef now offers consulting services focused on identifying work challenges and developing AI-driven strategies to improve organizational objectives. | Computer Science → Software Engineering 404 | artificial intelligence 291 programming 575 cybersecurity 688 database 1153 work 3122 | |
| empericum.nl | Empericum | The company connects practical experience with theoretical knowledge and has 24 years of specialized expertise in maintenance and project management. Empericum collaborates with Floricum, a specialist in OT-Security, to bridge the gap between management and the workforce. The website describes the services of Empericum and Floricum, including an OT-Security Check, and presents Jeffrey Polder’s expertise as the general director. | | personnel 1084 knowledge 3528 security 6655 collaboration 16036 | |
| ethisch-hacker.nl | SlimInICT | The website describes a training program for the role of Cyber Security assistant / Ethical Hacker, jointly organized by Philips, Werkmans and SlimInICT. The program is specifically targeted at people with autism who meet certain requirements regarding education and work experience (HBO/WO) and is part of the Philips Employment Plan (WGP). The website provides information about registration, assessment and a brochure for candidates, with a deadline for registration of January 15, 2018. | Technical → Security 408 | target group 578 cybersecurity 688 risk 2896 | |
| finnovation.nl | Finnovation B.V. | Finnovation has been supporting large financial institutions with analyses and project management since 1999. The website highlights Finnovation’s expertise in various areas, including Identity & Access Management, Digital Banking, and Payment Traffic, and describes their approach to managing change projects. The company emphasizes its 25+ years of experience and flexibility in addressing changing situations, with mention of traditional tea flavors and Bossche bollen. | Information Technology → Data Management 827 | identification 76 business analysis 90 analysis 1615 project management 3423 | 's-Hertogenbosch → Rosmalen 1059 |
| fiqcs.nl | FIQCS | The FIQCS project aims to create a roadmap and a fieldlab for Quantum Key Distribution (QKD). It will integrate, test, and evaluate QKD and Post-Quantum Cryptography (PQC) within specific use cases. The project intends to cooperate with standardization bodies to establish QKD standards and will work towards the certification of quantum safe solutions through a fieldlab. | Culture → Science 5261 | fieldlab 12 standardization 27 roadmap 125 certification 3380 | |
| forescout-nederland.nl | Forescout Nederland | Forescout is a solution that enables the automatic detection, classification, segmentation, and monitoring of users and devices within a network. The solution provides insight into various devices, including wireless, wired, BYOD devices, and external devices. Forescout automatically implements countermeasures when security risks are detected, and supports diverse ICT environments with different vendors. | Information Technology → Network Security 85 | device 698 security 6655 network 11123 | |
| futureproofyourcloudsecurity.nl | SLTN | The event takes place on Wednesday, October 12th, from 12:00 PM to 6:00 PM at the Van der Valk Hotel Amsterdam Zuidas. Speakers include Amitabh Singh (CTO EMEA Cortex & Security Evangelist) and Brian Vecci (CTO Varonis). The day is structured around registration, a welcome session, keynote speeches, VIP Round Tables, breakout sessions, a panel discussion, and a closing reception. The organizing company highlights that security should be a top priority for companies in hybrid and multi-cloud environments. | | cloud security 14 cybersecurity 688 speaker 1481 event 45199 | Amsterdam → South 1488 |
| gemici.nl | Gemici Consultancy | The company was founded in the Netherlands but primarily serves clients across the EU and Turkey, recognizing the potential benefits of collaboration between these regions. Gemici Consultancy believes that strong partnerships between Turkey and the EU are mutually advantageous and aims to act as a bridge in such activities. The company’s consultants possess diverse backgrounds and international experience, highlighting their adaptability and competitive edge, while also referencing wisdom from Mevlana Rumi about virtues like generosity and tolerance. | | eu 57 turkey 143 consultant 706 partnership 1407 consultancy 2596 technology 6816 | |
| getsecure.nl | Get Secure B.V. | The company focuses solely on information security, offering services from initial advice and implementation to complete project management. Get Secure's offerings include network security services like firewall management, cloud application delivery, and consultancy for network redesign. They provide penetration testing to assess and improve business IT infrastructure security, assisting clients in achieving compliance. | Information Technology → IT Security 980 | network security 22 penetration testing 43 firewall 51 cloud 1527 consultancy 2596 security 6655 | |
| goedkoopkeurmerk.nl | GoodkoopKeurmerk.nl | The website presents itself as a small certifying institution focusing on the SME and small security companies. The service includes arranging the application for the Security Seal, with a fixed price and a dedicated contact person taking responsibility. The website highlights the requirements for obtaining the Security Seal and provides links to additional information from the Dutch Safety Association. | Business & Management → Certification 364 | contact person 243 application 3377 certification 3380 | |
| googlecloudpartner.nl | Kloeys Cloud Computing | Kloeys Cloud Computing, founded in 2009, initially focused on 'paperless office' solutions and has since expanded to offer secure cloud solutions in partnership with Google. As the 'thé Google Cloud Partner in Europe,' Kloeys provides organizations with a suite of secure cloud solutions for data, archiving, and storage management, accessible anywhere. The website highlights Kloeys' capabilities in solving business challenges through Google Cloud, emphasizing collaboration and transformation across work, learning, and daily life, as well as offering a location in Amsterdam, Netherlands. | Software & Computing → Cloud Computing 1253 | cloud solutions 281 partnership 1407 security 6655 collaboration 16036 | North-Holland → Amsterdam 41253 |
| gripopsecurity.nl | Grip op Security | Grip op Security’s services include OSINT, software scans, external and internal penetration tests, threat modelling, and cybersecurity consultancy. Bob van der Staak, the owner, is a passionate ethical hacker with experience in both the Dutch railways and helping Dutch companies, including a significant number of critical infrastructure companies. Grip op Security provides clear reports, customized penetration tests, clear advice, and thorough research to improve application security. | Management → IT Strategy 185 | risk 2896 application 3377 security 6655 | |
| haraldvdl.nl | Haraldvdl | One post recounts a memorable experience related to misconfigurations and poor practices encountered as a Unix/Linux specialist. Another entry details the author's journey into 3D printing, starting with the purchase of a 3D printer for creating replacement parts and audio speaker components. A third post discusses a new project centered around building a small, portable speaker system, reflecting a desire for higher quality audio equipment after a long hiatus. | Operating Systems → Linux 255 | android 93 linux 237 3d printing 332 speaker 1481 security 6655 | |
| huurhacker.nl | Huurhacker.nl | The website publishes recent security alerts, including arrests of cybercriminals, imitation attacks on the Ukrainian Ministry of Defense, and new phishing attack methods. It also discusses targeted cyberattacks on defense industries and critical infrastructure, such as the BEARDSHELL and SLIMAGENT hack of a Windows server. The website emphasizes the importance of leadership in cybersecurity and the need for international collaborations to combat cybercrime, as exemplified by the operational role of international operation Eastwood. | Politics & Government → International Politics 199 | cyber threats 15 cybercrime 87 technology 6816 | |
| idprofs.nl | IDProfs | IDProfs helps non-profit organizations by ensuring the right people have access to relevant information, preventing them from appearing in the press due to negative publicity. The service is hired by CISOs, CTOs, boards, and supervisory councils of non-profit organizations that want to ensure their data access regulations. IDProfs works at the board level with over 65 clients in the non-profit sector and always begins with a risk analysis, identifying and reducing potential problems within 3-4 weeks, presenting solutions in a concise report. | Privacy → Data Protection 224 | checklist 426 procedure 750 risk 2896 report 4551 data 5872 | |
| ironflower.nl | Iron Flower | Iron Flower is an IT consulting firm specializing in Security Test Automation, DevOps Security Integration, Code Reviews, Security Awareness, and Pentesting. The consultant, who holds a Bachelor of IT degree and has over eight years of professional experience, has identified security vulnerabilities in established software and presented on security topics at conferences like DevOpsDays Amsterdam (2015) and Summer Of Pwnage (2016). The consultant's interests include responsible disclosures, mobile app development, penetration testing, software quality, and information security, further demonstrated by their activities like CTF competitions, computer building, and bug hunting. | Information Technology → IT Security 980 | devops 197 automation 2682 consulting 3639 security 6655 software 8291 | |
| itpillars.nl | itpillars.nl | The website covers topics such as ransomware, phishing, and security vulnerabilities in various software and hardware products, including WordPress sites and wifi thermostats. The article mentions recent cybersecurity incidents, such as the takeover of 200,000 WordPress sites via an SMTP plug-in vulnerability and the abuse of Cisco ISE vulnerabilities since July 5th. The website also publishes about criminal investigations and prosecutions related to cybercrime, such as the case of a British student who was sentenced for developing and selling phishing kits. | Computer Science → Networking 809 | cisco 12 kpn 29 steam 147 wifi 1372 wordpress 3551 | |
| ivo-partners.nl | Swinth | The company offers services such as Privacy, Data Protection Impact Assessment (DPIA), AVG Quick scan, and AVG Check. IvO stands for Information Security Government and operates in public-private collaboration, where the reliability of government is central. The website contains recent videos, tweets, and information about organized seminars, such as a recent successful seminar on the AVG with the Autoriteit Persoonsgegevens (Netherlands Data Protection Authority). | Community → Government & Administration 10567 | avg 145 information security 217 seminar 299 government 827 privacy 1286 | |
| janvanderbij.nl | Jan van der Bij | Jan van der Bij regularly shares his thoughts and findings about IT, architecture, and security through his blog. On July 15, 2019, he describes how a WordPress website can be timestamped in the blockchain using the WordProof plugin. He also discusses a major DDoS attack of 1.3 Tbps on March 6, 2018, and the used memcached technique, and refers to Akamai’s report. | Science → Computer Science 2413 | blockchain 250 it 1539 wordpress 3551 | |
| jochembraaksma.nl | HVC | Jochem Braaksma works as a Martech specialist at HVC in Alkmaar and describes himself as a creative technerd and gagetfreak with a passion for marketing and sales. The website contains a blog with instructions on deploying instances on Fuga Cloud using Terraform, migrating instances between OpenStack providers, installing WordPress with Ansible, and uploading custom images. Besides his professional activities, Jochem Braaksma describes his hobbies, including longboarding, DJing, VJing, photography, videography and web design. | Software & Computing → Cloud Computing 1253 | terraform 27 ansible 30 cloud 1527 wordpress 3551 marketing 7107 | North-Holland → Alkmaar 6507 |
| just-bc.nl | JUST | The company approaches business consulting from a combination of business administration and behavioral science, where human behavior is considered decisive for organizational success. The website offers a wide range of services, including advice on good governance, integrity, compliance, risk management, reputation management, and stakeholder management. The website publishes recent articles and podcasts on relevant topics such as mergers and acquisitions, integrity culture, ESG (Environmental, Social, and Governance) and compliance. | Municipalities → Governance 1043 Financial Services → Compliance 399 | integrity 205 merger 323 compliance 506 value 1352 behavior 1779 risk 2896 | |
| kantooronline.nl | Kantooronline.nl | Finnish ICT professionals possess a wide range of skills, including system management, coding, game design, and cybersecurity, with 82% having advanced programming skills. The website highlights the reliability and security of the deployment, particularly through the use of a Secure Virtual Desktop with isolation, data protection, endpoint security, and access control. Kantooronline.nl places significant value on trust and adherence to security policies, and provides secure access to virtual desktops from any device. | IT → System Management 272 | system management 431 cybersecurity 688 security 6655 | South-Holland → The Hague 19898 |
| la-consultancy.nl | L.A. Consultancy B.V. | The website emphasizes that there is no single solution for information security and highlights the value of information to various stakeholders. L.A. Consultancy assists organizations in raising their awareness and security levels across all layers, utilizing a pragmatic approach based on understanding the business needs. The consultancy offers services like auditing, governance, risk management, and vulnerability management, supported by a CISA-certified auditor with expertise in ISO 27001 and assurance reports. | Information Technology → IT Security 980 | information security 217 risk management 543 governance 610 audit 622 awareness 1735 consultancy 2596 | |
| lanmanvoorjou.nl | LanMan System Management | The website presents various services including system management, cybersecurity, and email management (LanMan mail). LanMan System Management describes their approach as not a single project but a continuous improvement process. The website mentions several projects and initiatives, such as a Ubiquiti LanMan project in Ibiza, support for Family Crisis in New York, and investments in tree planting. | IT → Managed Services 720 | ibiza 88 system management 431 cybersecurity 688 email 1012 | Haarlemmermeer → Hoofddorp 2739 |
| largos.nl | Largos | Largos is a consultancy firm specializing in information security and risk management since 2001, offering strategic, policy, and project management services. Largos’ services encompass the entire spectrum of information security, from policy development to operational implementation, including risk analysis, compliance, and project leadership. Largos has undertaken projects for various organizations, including financial institutions, government agencies, and businesses in the insurance, telecom, and process industries. | Information Technology → IT Security 980 | information security 217 risk management 543 policy 2149 | |
| ldb-hosting.nl | ldb-hosting.nl | The website covers the future of artificial intelligence and compares expectations with the reality of this rapidly evolving technology. Articles are presented about sustainable technologies that contribute to solving environmental problems such as climate change and pollution. There is an overview of the developments in web hosting, including a comparison of different types of servers, such as shared, VPS, and dedicated. | Data Science & Analytics → Artificial Intelligence 1831 | 5g 46 mac 81 webhosting 948 ai 2181 technology 6816 | |
| lisense-it.nl | Lisense IT B.V. | Lisense IT B.V. specializes in data security solutions to safeguard sensitive information. The organization offers mobile security solutions for protection of data on smartphones. Lisense IT delivers endpoint security solutions, both on-premises and in the cloud, and provides services such as vulnerability risk management, endpoint detection & response, and awareness training in collaboration with the SANS Institute. | Security & Surveillance → Security Services 445 | data security 20 firewall 51 | |
| martijngastkemper.nl | Martijn Gastkemper | Martijn Gastkemper, a back-end developer at grrr_nl and a blood donor at Sanquin, uses the site to experiment with technologies like AWS, Terraform, and Tor. He maintains a blog featuring articles on topics such as GitHub Actions, Tor configurations, and Dutch governmental website guidelines. The website's architecture utilizes AWS CloudFront and S3 for HTTP traffic and an AWS EC2 instance running Nginx and Tor for Tor traffic, managed through AWS Auto Scaling and cloud-init scripts. | Software Development & Engineering → DevOps 429 | tor 10 nginx 11 terraform 27 aws 62 | |
| melddatalek.nl | COTteam | The application is designed to simplify the registration of data breaches and provide the DPO with a clear overview of all incidents. Melddatalek provides a reporting structure and platform where incidents, trends, and taken measures can be viewed and managed. The website emphasizes the security of the application through cybersecurity packages and security scans. | Financial Services → Compliance 399 | data breach 16 dpo 19 application 3377 registration 4366 report 4551 security 6655 | |
| mightymedia.nl | Mighty Media | The website features a blog where the author shares his thoughts on web development and the internet. Mighty Media is planning to discontinue its activities. The website has a page focused on identifying websites that store passwords as plain text (plaintextoffenders.com). | Education & Training → Educational Software 274 | password 213 cms 613 web development 965 internet 1678 blog 13392 | |
| mijnveiligepraktijk.nl | MijnVeiligePraktijk | The practice offers a 'Security Baseline' that helps care professionals to secure their systems against cyber threats and comply with legal and regulatory requirements. The website highlights the benefits of increased security, compliance with regulations such as AVG, NEN7510 and NIS2, and the peace of mind provided by a reliable ICT partner. MijnVeiligePraktijk already has more than 800 customers and offers explainer videos to demonstrate the impact of their services. | Medical Care & Services → Primary Care 5699 | avg 145 compliance 506 security 6655 video 6714 practice 9089 network 11123 | |
| monkeysict.nl | Monkeys ICT | The company provides services such as penetration testing, vulnerability scanning, and training to protect businesses from cyber threats. Monkeys ICT focuses on identifying and resolving security issues in systems and networks. The company was founded by a team of cybersecurity professionals with a focus on customer-oriented solutions. | Information Technology → IT Security 980 | cyber threats 15 phishing 34 penetration testing 43 training 28133 | |
| motiva.nl | Motiva | The company offers solutions for modern workplaces built on Microsoft technology, focusing on security, compliance, and collaboration. Motiva assists organizations with cybersecurity resilience and compliance through smart security measures and support with laws and regulations. The services include various tasks, such as migration to Microsoft 365, managed services, security scans, and backup solutions. | Cloud Computing → Microsoft 365 97 | managed services 95 microsoft 183 migration 349 microsoft 365 430 compliance 506 security 6655 | |
| nedef.nl | NEDEF Cybersecurity | The website presents various security services, including EDR, RMM and backups, to protect businesses from cyber threats. NEDEF Cybersecurity emphasizes a simple and resilient approach, analyzing risks and threats and offering layered security solutions. The company offers solutions starting from €0.30 per day, making security accessible to small and medium-sized businesses. | IT → Network Management 702 | threat 62 backups 83 network management 235 cybersecurity 688 | |
| nieuwevogels.nl | Nieuwe Vogels | The company partners with the Center of Internet Security (CIS) to help clients step-by-step improve their cybersecurity, with automation playing a key role. The website emphasizes the importance of identifying one’s own valuables and vulnerabilities within an organization to ensure targeted investments. The organization offers tailored advice and training, suitable for the level and needs of the client, with the goal of making them self-sufficient and resilient. | IT → Managed Services 720 | valuables 11 nis2 27 cybersecurity 688 technology 6816 | |
| novasecuritas.nl | Nova Securitas | The website offers a ‘security check’ for webshops for a price of €99,- excluding VAT, which delivers an analysis of the security vulnerabilities. Nova Securitas provides interactive cybersecurity training programs to increase cyber awareness and skills. The organization offers risk analyses and incident response plans to prepare businesses for potential cyberattacks and to effectively combat them. | Information Technology → IT Security 980 | plan 2566 risk 2896 security 6655 webshop 8648 training 28133 | |
| ofcg.nl | OFC Group | OFC Group offers services in the areas of strategy and operations, particularly focused on identifying and solving bottlenecks in organizations. The company emphasizes a partnership relationship with clients, presenting itself as an extension of the organization and offering customized solutions. OFC Group has experience with various organizations, from small and medium-sized businesses to large international companies and government agencies. | Digital Media & Design → Digital Transformation 954 | business processes 564 cybersecurity 688 transformation 1081 strategy 9379 | |
| oosenbrug-advies.nl | Oosenbrug Advies | Astrid Oosenbrug founded Oosenbrug Advies, starting with a career at an internet provider helpdesk and later involved with the Dutch Institute for Vulnerability Disclosure (DIVD) and ESET Netherlands. She combines her technical background with political and social experience, gained as a former Member of Parliament and former chairman of COC Netherlands, with a focus on clear language and collaboration. The website provides insights into her areas of expertise, including cybersecurity, public-private collaboration, and digital inclusion, and showcases her publications in media such as NRC Handelsblad and RTL Nieuws. | Entrepreneurship → Social Entrepreneurship 311 | cybersecurity 688 politics 1259 education 13471 collaboration 16036 | |
| orior.nl | Orior BV | With over 30 years of experience, Orior BV offers expertise in compliance, network security, and regulations, specifically focusing on complex regulations such as BBGT, NIS2, and the Dutch Telecom Act. The website targets small businesses in the telecom and internet sector, which often struggle to meet the requirements of laws and regulations and risk non-compliance. Orior BV provides solutions for cybersecurity, data protection, advice and guidance, and strives for pragmatic and flexible approaches to achieve significant improvements in a short time. | Financial Services → Compliance 399 | network security 22 compliance 506 cybersecurity 688 regulation 1350 | |
| os3i.nl | OS3i | OS3i utilizes technology scouting, trend analysis, and foresight studies to identify potential threats and improvements in security. The organization builds ecosystems to accelerate innovation and facilitate the transition from research to practical application. OS3i provides Operational Strength in Safety and Security for now and the future, collaborating with partners across various sectors. | Military Affairs → Defense 31 | risk management 543 policy 2149 innovation 4659 security 6655 technology 6816 strategy 9379 | |
| partec.nl | Partec Data- and Telecommunication B.V. | The company provides IT consultancy, network management, VoIP telephony, and security solutions. Partec supplies hardware, software, and telephone systems, as well as network maintenance and security measures. Partec offers a complete solution and provides comprehensive support to clients in collaboration with partners, and is located in Moordrecht. | IT Services & Consulting → Computer Networking 47 | telephony 494 hardware 941 consultancy 2596 security 6655 software 8291 network 11123 | Zuidplas → Moordrecht 332 |
| pcsg.nl | PC Support Gooi & Eemland | The company is located in Eemnes and has over 25 years of experience in performing PC work. PC Support Gooi & Eemland offers both repairs and upgrades, and can also provide remote assistance. The company strives for an affordable solution for any budget and can also repair Apple computers. | Computer Hardware & Peripherals → Computer Stores 281 | laptop 1320 budget 1335 computer 1969 work 3122 repair 14576 | Hilversum → Amersfoortsestraatweg 28 |
| pepijnvanderstap.nl | Pepijn van der Stap | Pepijn van der Stap's background includes experience on both the offensive and defensive sides of cybersecurity, informing his approach to building resilient systems. He focuses on reverse engineering, protocol analysis, and security control mapping, utilizing frameworks like NIST CSF, OWASP ASVS, and ISO 27001 to ensure comprehensive understanding. The website features a blog and reports detailing his contributions to responsible disclosure, showcasing his commitment to strengthening the digital world. | Web → Internet 16456 | reverse engineering 34 protocol 237 framework 283 resilience 1091 security 6655 | |
| pim-it.nl | Pim IT | The company provides personalized IT management and support, including the installation and maintenance of Microsoft Office 365, for businesses and professionals. Pim IT offers a personal approach with direct communication via phone, app, or email, and incorporates cybersecurity as an integral part of their IT services. The company facilitates a modern online workspace, providing access to email, files, and apps across various devices, particularly supporting remote work thanks to Office 365. | IT → Management 346 | microsoft office 365 18 desktop 79 it management 150 cybersecurity 688 workspace 795 laptop 1320 | |
| proformance.nl | Proformance BV | Proformance is an organization comprised of experienced professionals with expertise in IT project and program management, IT architecture, IT engineering, and security. The company provides consultancy services at strategic, tactical, and operational levels, and assists with challenging changes within organizations. Proformance supports the implementation of IT projects, using teams of professionals or individual specialists, including assistance with NIS2 implementation. | IT → Network Management 702 | advise 94 implementation 1029 it 1539 consultancy 2596 security 6655 | Utrecht → Nieuwegein 2264 |
| radgiver.nl | Radgiver Accountancy | The firm emphasizes the importance of insight for making well-informed decisions, highlighting expertise, engagement, and digitalization as core principles of their services. Radgiver offers a wide range of accounting services, including administration, year-end financial statement preparation, payroll administration, consulting services, tax filings, and the use of cloud technology for online reporting. Radgiver’s strength lies in their ability to understand and resolve the administrative and organizational changes within companies, with a focus on reliability, independence, advice, and teamwork. | Accounting → Bookkeeping 1230 | financial statement 321 audit 622 insight 628 cloud 1527 administration 6587 | |
| reiva.nl | Anita Brinks MEDICAL INNOVATION TO MARKET | The consultancy specializes in supporting companies with innovative medical device ideas, helping them bring these ideas to market. Anita Brinks provides assistance with structuring startup companies, leveraging her extensive experience in the field. The website emphasizes a comprehensive approach, encompassing the entire process from initial concept to a market-ready product. | Pharmaceuticals & Medical Products → Medical Devices 388 | medical device 57 startup 376 consultancy 2596 | |
| remyx.nl | Remyx | Eric Blaauw offers services as an ICT coordinator, project manager, and interim manager, with a focus on Microsoft 365 transition and cybersecurity. He describes his background as a graduate of a Higher Information Technology program with a focus on the relationship between ICT and business processes. Blaauw has experience in operational and management roles and assists companies in various industries in improving their technology deployment. | Information Technology → Business IT 102 | microsoft 365 430 cybersecurity 688 ict 1049 cloud 1527 | South-Holland → The Hague 19898 |
| richardmarshall.nl | Richard Adam Marshall | The site details Marshall’s expertise in cybersecurity, highlighting his ability to identify and mitigate digital threats. He emphasizes his strong communication skills, describing himself as a virtuoso in face-to-face interactions and capable of explaining complex concepts to diverse audiences. Marshall also underscores his positive mental attitude and unwavering work ethic as key elements of his success in both technical and interpersonal areas. | Training → IT Training 220 | attitude 14 cybersecurity 688 skills 1105 communication 10162 | |
| rockshield.nl | RockShield | RockShield recognizes that cybercrime is a lucrative and growing international business model, and that companies are increasingly focusing on proactively identifying and preventing cyber security risks. The company has a team of Cyber Security Engineers with expertise in systems, infrastructure, and cyber security, who monitor and improve the security of systems and data. RockShield offers a combination of top-down and bottom-up cyber security approaches, with engineers controlling and improving cyber security of systems bottom-up to prevent attacks. | | cybercrime 87 engineer 198 cybersecurity 688 infrastructure 1460 data 5872 | |
| rotama.nl | Rotama | Rotama offers a variety of services, including cloud services, hardware, cybersecurity, and strategic advice. The company emphasizes the reliability, innovation, and personalized service it provides to its clients. Rotama is based in Oosterhout and operates in the IT sector. | IT → Managed Services 720 | cloud services 198 cybersecurity 688 hardware 941 ict 1049 | |
| rxn.nl | Rxn Regulatory Affairs | The company serves clients ranging from new businesses to large, international pharmaceutical corporations. Founded in 2002 by Rijk Riksen, Rxn Regulatory Affairs is headquartered in Dieren, Netherlands. Their core expertise includes securing and maintaining marketing authorizations and licensing for pharmaceutical products within the Dutch and European markets. | Legal → Regulatory Affairs 23 | authorization 32 netherlands 1376 consultancy 2596 | Rheden → Dieren 462 |
| secure2gether.nl | Secure2gether | A penetration test, also known as a pentest, simulates a cyberattack to identify vulnerabilities in computer systems. Secure2gether offers advanced penetration testing, custom security solutions, and security audits to strengthen the digital protection of its clients. The services include security awareness training, incident response, and data protection to help businesses protect themselves from cyberattacks. | Security & Surveillance → Security Services 445 | pentest 17 vulnerability 149 web application 609 cybersecurity 688 report 4551 security 6655 | |
| securehabits.nl | SecureHabits | The website offers a range of training programs including Threat Modeling, Secure Coding, and OWASP SAMM Assessment, focusing on integrating security into the software development lifecycle. SecureHabits also provides consulting services, including Security Architect and DevSecOps Expert support, to help organizations implement robust security practices. Furthermore, the website details services such as tabletop exercises and automated security scanning within CI/CD pipelines, aiming to establish application security as a regular habit within development teams. | Information Technology → IT Security 980 | cybersecurity 688 training 28133 | |
| selfdestruct.nl | Selfdestruct | The service provides a safe and convenient way to create and share encrypted notes. The note is encrypted on the user's device using AES-256 encryption, limiting access to the content. Upon opening the shareable link, the encrypted note is immediately destroyed from the database, and decrypted on the recipient’s device, ensuring maximum privacy and security. | Software → Productivity & Office 1203 | encryption 50 note 104 database 1153 | |
| shecurity.nl | Shecurity | Higher education institutions are increasingly targeted by cyberattacks due to the storage of valuable data such as personal information, research data, and intellectual property. The website describes the specific challenges in higher education, including large data volumes outside the building, a large and diverse student population, and the use of insecure devices. Shecurity provides solutions such as CISO as a Service and guidance for the SURF 2.3 audit, aiming to strengthen the cybersecurity of higher education institutions, considering budgetary constraints and a shortage of specialized professionals. | Municipalities → Governance 1043 | audit 622 cybersecurity 688 data 5872 student 7623 network 11123 | |
| site-gehackt.nl | Site-Gehackt.nl | The website offers help with fixing hacked websites, with a promise of a solution within 24 hours. Site-Gehackt.nl also offers services for the maintenance, security, and further development of websites and webshops. The company emphasizes personal service, quick response times, and a ‘No Cure, No Pay’ policy, where customers only pay if the problem is successfully resolved. | Web Design & Development → Web Technologies 34 | joomla 171 wordpress 3551 security 6655 | |
| smh-it.nl | SMH IT Audit & Risk | The company offers various audit services, including ISO certification audits, ISAE3402 audits, and ITGC audits, and supports businesses with their IT needs. SMH IT Audit & Risk utilizes a shared service center in Southeast Europe to fill temporary interim positions and support companies with extra IT capacity. The company also provides services focused on identifying and mitigating IT risks, assessing IT systems from a hacker's perspective, and implementing authorization management. | Information Technology → IT Security 980 | audit 622 control 911 risk 2896 certification 3380 | |
| smsnaaremail.nl | N.V. [Company Name - missing in text] | The website offers various subscription options for SMS to email gateways, including different numbers and email addresses. The system automatically converts incoming SMS messages into email messages and sends them to specific email addresses. The service uses a cloud-based solution without a physical SIM card, with interconnection with the KPN network to receive SMS messages. | Communication → SMS Services 17 | gateway 26 number 199 email 1012 subscription 3287 | |
| sqorpius.nl | Sqorpius | The website provides a Quick Scan service, mapping the most important risks for a company's continuity, for example, with regard to ransomware or data breaches. The website emphasizes the importance of cybersecurity, not only as an IT problem, but also by training employees and practicing responses to cybercrime. The website presents experts in information security and indicates that technological measures are crucial in resisting cybercrime. | Information Technology → IT Security 980 | cyber risk 15 data breach 16 ransomware 41 information security 217 employee 4429 | |
| stanhegt.nl | Stan Hegt | Stan Hegt began his career as a computer hacker at the age of 10 and has since gained over a decade of experience in the field, supported by a Master of Science degree in Information Security Technology. His primary areas of expertise include red teaming, incident response, threat intelligence, and security awareness training, with a particular focus on the financial sector. Stan Hegt’s expertise is publicly recognized through media appearances and academic lectures, along with security advisories and academic research supervision focusing on various security vulnerabilities and techniques. | Information Technology → IT Security 980 | hack 36 penetration testing 43 security 6655 research 8967 training 28133 | |
| stmps.nl | STMPS | STMPS (Secure Transport of Mail Protocols Secure) is a digital postage stamp that securely transmits data between mailboxes, using a ‘mon-key’ key code. The system operates on a pay-per-use model, where users only pay when they send emails, without contract obligations. STMPS offers authentication to prevent unauthorized access to sensitive information, such as files, quotes and personal data, and complies with AVG/GDPR legislation. | Software & Computing → Computing 696 | authentication 48 email 1012 data 5872 | |
| symposiumcheops.nl | Symposium CHEOPS | The symposium will be held on November 22, 2024, from 10:30 to 17:00 at the TU/e Campus Auditorium and features four speakers followed by a panel discussion with experts. The event explores seemingly impossible concepts that could become future realities, with subthemes including building in polar regions and space. The symposium concludes with a networking event, and the website provides details about the participating organizations, including Snøhetta, Bjarke Ingels Group, BESIX, and KCAP. | Events → Conferences & Meetings 5381 | symposium 339 networking 842 architecture 3223 design 27202 | |
| synergygroup.nl | Synergy Group | The company believes that strategic collaborations and innovative ecosystems are essential for organizations to remain relevant in a changing world. Synergy Group develops, invests in, and manages these ecosystems by working with companies and public-private organizations. Activities include defining shared goals, finding partners, aligning ambitions, and facilitating the financing of ecosystems. | | ecosystem 262 model 3546 partner 4272 innovation 4659 goal 4974 collaboration 16036 | |
| thinksecurity.nl | Think Security | Think Security recognizes the importance of cybersecurity in a rapidly changing digital landscape and provides solutions for various environments, including cloud, on-premise, and hybrid. Services include data security solutions, email security, firewalls, DLP (Data Loss Prevention), SIEM integration, and DMARC implementation. Additionally, security assessments, awareness training, and managed firewall services are offered. The company emphasizes the role of human factors in cybersecurity and provides assistance in raising awareness and preventing careless behavior by users. | Security & Surveillance → Security Services 445 | firewall 51 cybersecurity 688 email 1012 assessment 1205 data 5872 | |
| totalsecurityadviseurs.nl | Total Security Adviseurs B.V. | The company provides services such as project management, tendering advice, and innovative ideas in the field of security. Total Security Adviseurs B.V. describes itself as a reliable partner that works with advanced technologies and a long experience in consulting and implementation. The company has offices in Zurich and Paris and is known for over two decades of proven success in the security industry. | Consulting → Security Consulting 31 | tender 329 project management 3423 consulting 3639 security 6655 technology 6816 | Southwest-Friesland → Zurich 138 |
| uber-hackclaim.nl | Corpocon Legal B.V. | In October 2016, over 55 million customers and 7 million drivers of Uber worldwide were victims of a data breach caused by a security flaw within Uber. Uber has concealed the hack for years and paid a hacker $100,000 to delete the data and remain silent, orchestrated by founder Travis Kalanick. The initiative taker, Corpocon Legal B.V., represents the victims and handles mass claims globally, focusing on obtaining compensation for Dutch Uber users and drivers. | Law → Consumer Law 181 | data breach 16 compensation 576 driver 1832 data 5872 | |
| vanhoudt.nl | Van Houdt Cybersecurity | Erik van Houdt offers advice and solutions for organizations’ security and privacy challenges, ranging from hospitals to international organizations. His services include longer projects, interim management roles (CISO, CIO), gap analyses, and risk analyses. Van Houdt Cybersecurity emphasizes a pragmatic and flexible approach, analyzing business processes from various perspectives to advise clients on the best choices in a rapidly changing technological environment. | Privacy → Data Protection 224 | cybersecurity 688 privacy 1286 risk 2896 | |
| veiligonlinezijn.nl | Municipality of Rijswind | The website provides information about the municipality and tools to prevent cybercrime. Informative videos are available to make residents more resilient and guide them on the necessary next steps in case of cybercrime victimization. A knowledge quiz and a cybercrime checklist are used to solidify new knowledge, including a data breach check. | Information Technology → IT Security 980 | data breach 16 cybercrime 87 checklist 426 resident 3245 campaign 3428 video 6714 | |
| virtualix.nl | Nick Boltjes | The website includes excerpts from command-line configurations using tools like `ipmitool` for managing network interfaces on a server, demonstrating IP address and network settings. It features Dockerfiles and stack files, showcasing how to set up a Traefik reverse proxy with HTTPS redirection, basic authentication, and SSL certificates. The website also contains documentation on security topics like Nginx SSL/TLS and Diffie-Hellman key regeneration, alongside examples for setting up KVM and Postscreen. | Operating Systems → Linux 255 | nginx 11 docker 111 linux 237 security 6655 | |
| watermarkhu.nl | Mark Shui Hu | The website features an ‘About’ section detailing Mark’s name, origins, and professional background, explaining the meaning behind his username ‘watermarkhu’. It includes a ‘Blog’ section showcasing his recent post, ‘How to not drift away when reading academic papers.’ The site encourages visitors to connect with Mark via social media links, directing them to his online profile at watermarkhu.nl. | Research & Academia → Academic Subjects 22 | username 63 physics 93 engineer 198 developer 406 blog 13392 | |
| webdesignuitdepolder.nl | WebDesignUitDePolder (SSP) | The website discusses the Solid Security (PRO) plugin, which is used to protect websites against brute-force attacks. It details how the plugin’s lockout page functions, displaying an IP address lockdown when a certain number of incorrect login attempts are made. The site provides information on customizing the lockout page, allowing for flexibility in security settings. | Programming Languages → PHP 400 | ip address 39 plugin 203 wordpress 3551 security 6655 | |
| wi-five.nl | Wi-Five IT | The company specializes in enhancing Wi-Fi connections, ensuring a stable connection throughout the home or office. Wi-Five IT also provides camera security solutions, allowing users to view footage on various devices without additional subscription fees. In addition to Wi-Fi and security, Wi-Five IT also offers website building services and computer advice. | Connectivity → Wireless Internet 10 | wifi 1372 camera 1733 computer 1969 network 11123 | |
| xtrn-secure.nl | XTRN-SECURE | The company offers a variety of services, including consultancy, project management, 24/7 support, monitoring as a service, and various security solutions such as Endpoint Protection, network security, and incident response. XTRN-SECURE emphasizes the need for continuous protection and oversight, going beyond basic security, and offers services such as risk scans, awareness training, and proactive monitoring. The website provides an overview of their services and offers the opportunity for a free cybersecurity analysis and consultation. | IT → Managed Services 720 | service provider 225 cybersecurity 688 monitor 1063 risk 2896 | |
| yellowsmile.nl | Yellow Smile ICT Services | The company offers training programs, developed for various clients including an international printer manufacturer. Yellow Smile specializes in installing, configuring, and maintaining business environments, particularly Microsoft Windows Server, Remote Desktop Environments, and Office 365, leveraging Microsoft Teams. The company’s expertise also lies in software development, specifically in the area of PDF solutions, including the website www.digitaalbriefpapier.nl and custom solutions for automating PDF processes. | IT → System Management 272 | pdf 142 software development 358 system management 431 it 1539 training 28133 | |
| zeglala.nl | zeglala | The website describes the risks of AI, particularly the possibility of falsifying voices and faces, enabling identity fraud. It explains that AI fraud can have devastating consequences for both individuals and organizations, including financial damage and reputational harm. The website introduces LALA as a smart and simple concept that helps users verify whether the person they are speaking to on the phone is actually who they claim to be, in an era of deepfake technology. | Personal Wealth → Personal Finance 2348 | fraud 200 face 368 voice 1090 ai 2181 | |
| zerotrustnetworks.nl | ZeroTrustNetworks.nl | The company highlights that many organizations still rely on outdated security and introduces a new approach that trusts no one by default. Services include security assessments, tailored advice, and implementation of cybersecurity solutions such as network security and endpoint protection. The company also offers proactive management, monitoring, and updates of security systems to protect organizations from new threats. | Information Technology → IT Security 980 | threat 62 implementation 1029 assessment 1205 security 6655 network 11123 | |
| mifcs.nl | MifCS | MifCS focuses on delivering advanced cybersecurity and IT solutions, with a particular emphasis on Microsoft Intune and SentinelOne for endpoint security and device management. The website outlines services such as Mobile Device Management, Endpoint Protection, cloud service management, and proactive cybersecurity measures using AI-powered threat detection. MifCS offers dedicated support, custom cybersecurity solutions, and a commitment to secure and efficient IT environments, alongside providing a contact address in Amsterdam. | Software & Computing → Cloud Computing 1253 | it solutions 181 cybersecurity 688 | North-Holland → Amsterdam 41253 |
| alkmaarvictorieonderneemt.nl | Alkmaar Victorie Onderneemt | The organization facilitates weekly meetings where members support each other, exchange professional recommendations, and build trusted relationships. The goal is to create a positive and collaborative environment that helps entrepreneurs grow their businesses and achieve their goals. Members can increase their revenue through recommendations and benefit from extensive networking opportunities through 52 annual networking events, which increases their visibility among many other business professionals in their region. | Social Organization → Networking Organizations 475 | recommendation 120 growth 4054 goal 4974 network 11123 collaboration 16036 | North-Holland → Alkmaar 6507 |
| blackcastle.nl | Black Castle | Black Castle is a training center specializing in security training programs, offered both nationally and internationally. These training courses are developed by experienced instructors and professionals in the field, aiming to equip participants with the necessary skills to minimize or prevent risks. In collaboration with international partners, training programs are offered to bring participants to the desired level of expertise in personal security, even in high-risk areas. | Technical → Security 408 | risk 2896 partner 4272 security 6655 training 28133 | |
| procammedialtd.nl | Procam Media Limited | The company has over 30 years of experience in management and consultancy. Clients can contact via phone or email to schedule an appointment. The website includes important documents such as terms and conditions, privacy policies, and cookie policies. | Information Technology → IT Security 980 | intellectual property 109 domain names 129 document 1678 consultancy 2596 | Gelderland → Nijmegen 9384 |
| vanduijnconsult.nl | Van Duijn Consult | The founder, Kees van Duijn, has over 20 years of experience in the construction industry and has further deepened his knowledge of IT applications in businesses through his MBA. VDC offers flexible solutions for business, organizational, commercial, and technical questions, in collaboration with the client. The company organizes infrastructure and civil engineering projects and tenders, from initiative to maintenance, and advises on various issues, such as the development of residential areas or the construction of infrastructure. | Information Technology → Business IT 102 | infrastructure 1460 it 1539 question 2261 | |
| prusec.nl | Prusec | The Prusec team comprises Alex Duivelshof and Mark Beerends, both seasoned information and cyber security consultants with extensive experience in the financial industry. Alex Duivelshof, based in Zurich, has held roles as a Senior Information Security Consultant, Ciso Advisory, Security Strategy Officer, and Startup-Bootcamp Mentor, emphasizing innovation and security culture. Mark Beerends, formerly Head of SOC at UBS and Head of SOC at Tier 1 Rabobank, brings a strong technical background and experience in building and managing cyber security programs, alongside analytical and problem-solving skills. | Information Technology → IT Security 980 | cybersecurity 688 consultant 706 risk 2896 innovation 4659 security 6655 | Southwest-Friesland → Zurich 138 |
| cyrrus.nl | Cyrrus Cyber Security | The website details Cyrrus’s offerings, including solutions like LogRhythm, MistNet, and Menlo Security, designed to address evolving cybersecurity threats within various environments such as cloud, data centers, and IoT. Cyrrus emphasizes a shift towards zero-trust models and comprehensive cloud security strategies, acknowledging the challenges posed by the de-perimeterized nature of cloud computing and the increasing involvement of external entities within the enterprise. The site highlights the growing threat landscape, citing projected cybersecurity losses and the increasing reliance on managed security services, and emphasizes the need for proactive security measures and rapid response times. | IT → Managed Services 720 | cloud security 14 threat 62 cloud 1527 security 6655 | |
| companycode.nl | Company Code | The site regularly publishes articles about cyber security, including the identification of configuration errors that make companies vulnerable to hacks and the role of AI in combating cybercrime. In addition, the website covers topics related to business support, such as the success of entrepreneurs, advertising formats, and the value of business gifts. The company offers services in the development, growth, change and online security of companies, with an emphasis on providing a ‘helicopter view’ and recommending a business coach. | | cybersecurity 688 ai 2181 advertising 2302 risk 2896 coach 25810 | |
| cyberagent.nl | Volto Labs B.V. | The Cyber Agent Technology (CAT) platform automates the capture and analysis of private conversations and data from various social media and chat applications, including those with disappearing messages. CAT offers near real-time review, effortless export, and customizable reporting through open technologies and a multi-model graph database, with the option for on-premise deployments for data security. Volto Labs, a privately owned Dutch company, leverages decades of experience in cybersecurity and digital forensics, partnering with The Hague Security Delta and offering services to government and law enforcement agencies. | Governance → Law 14133 | osint 12 report 4551 data 5872 | South-Holland → The Hague 19898 |
| mickdepeinder.nl | Mick de Peinder | Mick de Peinder is a software engineer with expertise in information security. He holds a Bachelor's degree in Software Engineering from Avans University of Applied Sciences and is currently pursuing a Master's degree in Cyber Security at Radboud University. He has achieved the OSCP certification, demonstrating his skills in penetration testing. | Computer Science → Software Engineering 404 | software engineer 65 information security 217 university 593 cybersecurity 688 | |
| tauw-thuiswerkplek.nl | TAUW | The website offers a login functionality for existing customers, where users can identify themselves via a business email address from TAUW / Syntraal. The online store sells various products, including office chairs and accessories, that comply with safety standards. The website uses CCV Shop software and sets cookies for measuring visits. | Business Software → Productivity Tools 416 | login 160 workspace 795 email 1012 shop 6483 | |
| 4thedata.nl | 4thedata | 4thedata advises, engineers, and delivers solutions, with the customer's wishes at the forefront. The company combines a detailed analysis of the current situation with customer requirements to offer the most optimal solution. 4thedata has 20 years of experience in various industries and collaborates with partners in data, telecommunications, security, and ICT sectors to ensure good service. | IT → Managed Services 720 | connectivity 173 data 5872 security 6655 communication 10162 collaboration 16036 | North-Brabant → Reusel 296 |
| quriaz.nl | Quriaz | Quriaz originated from curiosity to combine existing technologies and create better solutions. The company works in various areas, including telephony, security, care & comfort, and internet, and also offers management services via SaaS. Quriaz emphasizes that bespoke solutions don’t necessarily have to be expensive, thanks to their expertise and long-standing experience in various technical disciplines. | IT → System Management 272 | cloud management 16 telephony 494 security 6655 | |
| oxno.nl | OXNO IT SUPPORT | OXNO IT SUPPORT provides a complete IT department for businesses, including remote IT support, proactive maintenance, 24/7 monitoring, and antivirus security. The services encompass managed security services to protect businesses against cyber threats, back-up and recovery solutions, and an ‘always-on’ IT helpdesk for unlimited support. OXNO IT SUPPORT possesses IT certifications such as Microsoft Certified and CISSP Security, and is certified according to ISO 9001 & 27001.” | Software & Computing → Cloud Computing 1253 | backup 494 certification 3380 security 6655 | |
| thecooperative.nl | The Cooperative | The company was founded with the goal of offering bespoke security solutions, recognizing that each client has unique needs. They specialize in areas such as exposure analysis, information security, and digital investigation, employing industry best practices and prioritizing discretion. Clients are encouraged to contact the company through a provided form to discuss their security requirements. | Security & Surveillance → Security Services 445 | methodology 332 investigation 400 analysis 1615 security 6655 | |
| es4cs.nl | ES4CS | The website provides an overview of Leo van Koppen's background and ambitions, primarily focused on strengthening cybersecurity in education and organizations. ES4CS, the company abbreviation, describes the service offered: providing support in developing cybersecurity knowledge and skills. The website includes contact information, including a mobile phone number, email address, Twitter handle, and the address of the location in Naaldwijk. | Government & Administration → Government Organizations 1002 Business Services → Collaboration 409 | responsibility 329 cybersecurity 688 skills 1105 knowledge 3528 education 13471 | Westland → Naaldwijk 903 |
| obsidiantraining.nl | Obsidian Training | The training covers various topics, including installing Obsidian, creating and formatting notes, using plugins, and organizing notes in folders. Obsidian Training offers different training formats, such as in-company, open registrations in Doetinchem, and online training, tailored to the needs of participants. The website specifies various prices for the training, including €495,- for open registrations in Doetinchem and €1.795,- for group training in-company. | Software → Productivity & Office 1203 | note 104 plugins 123 productivity 496 training 28133 | Gelderland → Doetinchem 2706 |
| excelitservices.nl | Excel IT Solutions | The website emphasizes the importance of safety and security in all aspects of business operations, from financial transactions to workplace environments. Excel IT Solutions utilizes technology to identify vulnerabilities and implement robust security measures, safeguarding data and assets. The company aims to provide businesses with the tools, resources, and support needed to navigate their business landscape with confidence and peace of mind. | IT → Managed Services 720 | threat 62 data 5872 security 6655 technology 6816 | |
| unive-cyberlympics.nl | Univé | The Cyberlympics is an internal competition organized by Univé to test employees’ knowledge of cybersecurity and phishing. Teams of five colleagues can register and participate in the competition, which starts after June 7th and lasts approximately four months. The competition includes phishing simulations, and the winners receive a prize. | | phishing 34 webinar 870 | |
| cybersafer.nl | Cybersafer B.V. | Cybersafer offers expert advice and tailor-made solutions within the field of cybersecurity. The company provides various services, including identifying and protecting organizational processes, implementing technical and organizational security measures, and conducting NIS2 assessments. Recent projects include NIS2 assessments, Control Framework implementation, and vulnerability management, with GGZ / Mental Healthcare as a client. | IT → Network Management 702 | iso27001 22 cybersecurity 688 implementation 1029 risk 2896 research 8967 | |
| exody.nl | Exody BV | Exody focuses on mediating between IT specialists and companies looking for new staff. The company offers both temporary and permanent placements and actively searches for suitable candidates for open positions. Exody BV is located in The Hague and provides services to both IT professionals and clients in the ICT sector. | | intelligence 81 it 1539 animation 1777 candidate 1896 recruitment 2015 | South-Holland → The Hague 19898 |
| interweps.nl | Anne Jan Brouwer | The interweps is described as a large, worldwide distributed network containing much knowledge and information, but without historical data or the ability to undo actions. The website emphasizes that the interweps is not a personal help service and is not politically correct or easy to navigate, with humorous answers to questions. The site explains that interweps uses SNI technology to host multiple secured websites and is based on the ‘jargon file’ and rgwiki, with contributions from various individuals and sponsored by World Coffee. | Radio & Communication → Networks 341 | logo 4660 software 8291 | |
| c3i.nl | c3i.nl | The text includes sections labeled "Resources" and "About," suggesting a site offering informational content and potentially services. The website mentions "Threat Analysis" and "Threat Intelligence Analyst," indicating a focus on cybersecurity and risk assessment. The site incorporates social media links (Twitter, Email) and a copyright notice, signifying it's a publicly accessible online presence. | Information Technology → IT Security 980 | twitter 76 resources 310 email 1012 | |
| pandora-it.nl | Pandora IT | The website provides an overview of various services, including vulnerability assessments, penetration tests, and ‘Hacker for a Day’ training programs. Pandora IT offers consultancy services and security awareness training delivered by certified ethical hackers, using practical examples. Furthermore, Pandora IT offers products such as the ‘Pandora Box’ and supports businesses in collecting and securing important data carriers in case of cybersecurity incidents. | Technology → IT 3337 | penetration test 17 cybersecurity 688 consultancy 2596 training 28133 | |
| yusufyusuf.nl | Yu Yu Consultancy | Yusuf Yusuf is a software engineer based in The Netherlands specializing in web and cloud native solutions for various companies. His expertise includes technologies such as .NET Core, C#, Azure DevOps, and ASP.NET Core, with experience in both back-end systems and dashboard/portal development. Yusuf holds a Bachelor of Science in Informatica from Rotterdam University of Applied Sciences and a MBO degree in Marketing & Communication from ROC Zadkine. | Software Development & Engineering → Technology Companies 29 | application 3377 knowledge 3528 software 8291 communication 10162 | |
| awarenessbox.nl | Awarenessbox | The Awareness Journey is a core component of the approach, starting with research to identify the needs and risks of the organization. Awarenessbox offers various interventions such as campaigns, training, and stickers, focused on raising awareness of cybersecurity and resistance to phishing. Furthermore, Awarenessbox provides support and ensures compliance with laws and regulations, with the goal of protecting the organization from cyberattacks. | Business & Entrepreneurship → Corporate Finance 330 | journey 701 awareness 1735 campaign 3428 research 8967 maintenance 20093 | |
| randygraham.nl | Randy Graham | The company is a recruitment and selection agency focused on mediating IT architects, particularly within the fields of architecture and cybersecurity. Randy Graham offers both permanent and temporary recruitment solutions and is known for a personal approach and transparency. Due to its small scale and specialization in this niche, the agency can provide specific knowledge and insights into the IT architecture market and top professionals within these disciplines. | HR Services → IT Recruitment 447 Staffing & Recruitment → Technical Staffing 395 | it 1539 recruitment 2015 architecture 3223 security 6655 | |
| littlekingpartners.nl | Little King Partners (LKP Holding) | The company offers various services, including web and mobile development, projects, and a blog. The website also includes a shop with electronics and computing products, and offers IT Audits and Cyber Security services through CBA-ECS. In addition to the services, Little King Partners also offers recruitment agency services and describes their organization as a company active through various work societies. | Information Technology → IT Security 980 | cybersecurity 688 web development 965 electronics 971 it 1539 talent 3987 | |
| flexnetworks.nl | Flexnetworks | The website outlines Flexnetworks' services, including cloud, on-premises, SDN, wireless networks, and cybersecurity, emphasizing a price-conscious approach compared to typical enterprise solutions. Flexnetworks distinguishes itself with a streamlined and hassle-free approach to network management, aiming to reduce the complexity often associated with network infrastructure. The site highlights features such as website import capabilities, user access delegation, and custom database form creation for data collection and secure user management. | IT Services & Consulting → Computer Networking 47 | cybersecurity 688 database 1153 cloud 1527 network 11123 | |
| buzzar.nl | Buzzar BV | The company’s core expertise lies in navigating the complexities of the hyperconnected enterprise, assisting clients with envisioning, planning, and executing future-proof strategies. Andy Zakharov, the founder, draws on extensive experience collaborating with global companies to address business challenges through connectivity and data, highlighting the importance of understanding the evolving digital landscape. Buzzar BV seeks to counteract a trend where technology overshadows its role as an enabler, helping clients overcome barriers and achieve tangible improvements in the real world. | | connectivity 173 challenge 1697 data 5872 technology 6816 strategy 9379 | |
| sblcyberinfo.nl | SBL Cyberinfo | The tool, available as a SaaS solution, offers tests such as BIA, Baselinetoets, GAP, in-depth risk analysis, and DPIA. The platform saves time and energy, provides insight into the cyber resilience of an organization, and allows for the sharing of best practices. SBL Cyberinfo collaborates with the Information Security Department of Municipalities (IBD) to support users in executing analyses and sharing best practices. | Insurance & Risk → Risk Management 1060 | toolkit 157 risk analysis 217 tests 315 cybersecurity 688 collaboration 16036 | South-Holland → The Hague 19898 |
| securist.nl | Securist | The website offers various inspection options, including email inspection, website inspection, and inspection requests. The platform covers topics such as cryptography, SSL certificates, domain name security, and email security protocols like SPF and DKIM. Securist provides reports with identified vulnerabilities and suggests solutions to protect companies and customers from cyber threats. | Information Technology → IT Security 980 | vulnerability 149 inspection 4279 report 4551 security 6655 | |
| website-webhosting.nl | Website Webhosting | The website covers topics such as Search Engine Optimization (SEO), market research, responsive design, and building a professional website. It offers information on various marketing strategies, including advertising and organic growth. The website also provides contact options via email address. | Providers → Domain Names 1466 | market research 163 webhosting 948 domain 1811 seo 3707 | |
| takethesword.nl | Artem Sheludko | The website’s genesis is linked to a recommendation to use ‘the Sword’, a PowerShell tool for troubleshooting, shared by a colleague. Artem’s experience spans various roles, including Sys-admin (building greenfield clusters), Project Lead Engineer (migration and NOC setup), Technical Lead Engineer (NOC expansion), and Cloud & Security Engineer (building a SOC). Prior to his technical career, Artem had roles as a Car Mechanic and Servicedesk representative, and he highlights positive experiences working with Driex, emphasizing his skills and accomplishments. | Software & Computing → Computer Systems 19 | powershell 47 sword 66 cybersecurity 688 | Netherlands → Friesland 27911 |
| rikleemans.nl | Nerium Cyber Security | Rik Leemans, a 24-year-old cybersecurity professional, focuses on analyzing security threats and engineering cloud security solutions, primarily within Microsoft environments. His technical expertise includes tools such as Microsoft Defender, Sentinel, EntraID, Azure resources, Crowdstrike, Python, PowerShell, and Bash. Currently, he is employed as a Security Analyst/Engineer at Nerium Cyber Security in Eindhoven, and has undertaken projects involving Microsoft Sentinel, Azure, and IoT applications. | Software Development & Engineering → DevOps 429 | python 167 microsoft 183 azure 222 cybersecurity 688 | Sittard-Geleen → Geleen 978 |
| secur-ing.nl | Secur-ing | Secur-ing provides supplementary services such as digital investigations, information security training and fire safety training (BHV), awareness presentations, and lockpicking workshops. These services are often performed outside of regular business hours. The website also offers links and downloads related to information security (IB). | Information Technology → IT Security 980 | information security 217 compliance 506 training 28133 | |
| mwilmer.nl | TNO | A major ransomware attack has disrupted society in the Netherlands, causing blackouts, transportation disruptions, and financial issues. Players assume the role of Dutch law enforcement investigating the cyberattack and tasked with identifying and capturing the perpetrators. The escape room focuses not just on tracing criminals but also on understanding how information is stored and exchanged, using principles of the semantic web and linked data. | Games → Escape Rooms 410 | cyberattack 21 escape room 430 game 2807 technology 6816 | |
| auditaas.nl | AUDITAAS | The company offers services such as information security, cybersecurity, advice, auditing, implementation, and certification preparation. AUDITAAS delivers assurance and compliance as a service, with a scaled solution tailored to the organization, at a fixed monthly price. The website provides information about various audit and risk management services and offers a contact method to schedule a meeting. | Financial Services → Compliance 399 | information security 217 compliance 506 risk management 543 audit 622 | |
| basrijnbout.nl | Bas Rijnbout | The blog features articles on topics like open source library risk management and proper input validation. A post from May 25, 2024, discusses the importance of considering people, process, and technology aspects during open source library risk management throughout the Software Development Lifecycle. Another entry, published December 31, 2021, outlines four steps for implementing proper input validation in applications. | | risk management 543 web development 965 technology 6816 | |
| novaselect.nl | Nova Select | The website contains information about Nova Select’s services, including finding cybersecurity experts for employers and guiding professionals in their careers. The website features job postings for various cybersecurity positions, such as Senior Manager Cyber Strategy & Transformation and Senior Consultant Cyber Strategy & Transformation. Nova Select describes itself as a knowledge partner with deep cybersecurity expertise and extensive recruitment experience, with the goal of making an impact for its clients. | Staffing & Recruitment → Technical Staffing 395 | job postings 676 cybersecurity 688 talent 3987 | North-Holland → Amsterdam 41253 |
| hamon-security.nl | Hamon Cyber Security | The organization specializes in technical security assessments, including analyzing wireless networks and web applications, as well as automated security scans and penetration testing. Furthermore, Hamon Cyber Security offers organizational IT security services, including the development of security policies, implementation of standards and procedures, and providing advice on risk mitigation. Technical security assessments identify vulnerabilities and advise on mitigation strategies, while organizational security services help organizations integrate IT security into their policies and increase overall security. | Information Technology → IT Security 980 | vulnerability 149 scan 790 policy 2149 risk 2896 | |
| binq-emotion.nl | Novaris Innovative Technologies | The company’s mission is to enhance the quality of human life through the development and demonstration of advanced products and technologies. Their areas of expertise include software security, wireless sensor networks, body-area networks, and in-door localisation techniques. Novaris distributes security products from ROCKEY and ePASS in the Netherlands, Belgium, and Luxembourg, emphasizing ease of implementation and affordable security. | Industry → Industrial 1987 | security products 17 technology 6816 | |
| csat.nl | CSAT | CSAT focuses on screening, coaching, advising, and training professionals, with communication at the core of their services. Wies Moget leads CSAT and has a long background in communication and guiding professionals in healthcare and business. CSAT organizes seminars, training courses, and workshops, including a seminar with Prof. Dr. Manfred Kets de Vries and a four-day training on ‘business’ communication in leadership. | Professional Development → Training Programs 129 | seminar 299 communication 10162 coach 25810 training 28133 | Netherlands → Groningen 23734 |
| antispam-gateway.nl | ISPWeb B.V. | The Anti-Spam and Anti-Virus Gateway is a security system that filters spam, viruses, phishing, and harvesting, improving the security of organizations. This gateway is particularly suitable for businesses that want to outsource their spam problems without needing to make complex adjustments. Activating the gateway is simple and takes only a few minutes, requiring the MX records of the domains to be referred to the cloud service. | Services → Email 161 | spam 34 cluster 81 virus 195 filter 487 cloud 1527 domain 1811 | |
| ransomwarehulp.nl | Hulp bij Ransomware | The website offers various services, including ransomware prevention, network security, and the delivery of firewalls and other security solutions. Hulp bij Ransomware is part of Randstad ICT and offers temporary promotions such as an entry-level smart firewall against ransomware for 75 euros per month, and secure internet connections. The website describes the need for network security to prevent ransomware attacks and offers assistance in resolving ransomware infections, including network segmentation and server restoration. | Financial Management → SME 161 | ransomware 41 firewall 51 security 6655 network 11123 | |
| sherman.nl | Sherman consultancy B.V. | The company emphasizes the crucial role of a strong defense for teams in various sports, utilizing dynamic systems to detect and defend against new cyber threats. Sherman Consultancy B.V. leverages its extensive experience to provide its clients with a 'top defense'. The website is owned by Sherman consultancy B.V. | Information Technology → IT Security 980 | cyber threats 15 defense 121 | |
| movementlabraalte.nl | Movement Lab Raalte | The goal of Movement Lab Raalte is knowledge sharing and realizing beautiful projects. The website offers support for personal development through data analysis. The lab collaborates with various partners, including Innofeet, DiĆ«tistenpraktijk Salus, Voet- en Bewegingsadvies Salland, and Fysiotherapie Salland. | | privacy 1286 partner 4272 data 5872 | Overijssel → Raalte 1771 |
| jarnovdbrink.nl | Jarno van den Brink | The site features descriptions of several Vulnlab challenges, including 'Vulnlab Standalone - Sendai,' 'Vulnlab Chain - Push,' and 'Vulnlab Chain - Intercept,' each with varying difficulty levels and specific technical details. Jarno van den Brink has published reviews of certifications such as the Certified Azure Red Team Professional (CARTP) and the Certified Red Team Operator (CRTO), detailing his experience with their courses and labs. The website also includes trending tags related to Active Directory, Azure, and various Red Team certifications, suggesting a focus on offensive security and related technologies. | Software Development & Engineering → DevOps 429 | azure 222 certification 3380 | |
| seteso.nl | Seteso | Seteso is a young, dynamic, and expanding company focused on customer service, flexibility, and a good price-to-quality ratio. The company divides its expertise into three main categories: Security, Cameras, and Maintenance. Website visitors can modify their web pages using the available text editor and style elements. | IT → Network Management 702 | value 1352 camera 1733 security 6655 maintenance 20093 | |
| intrendo.nl | InTrendo IT | InTrendo IT provides advice, guidance, and execution for e-commerce and IT projects, with a focus on realizing the goals of the client. The company offers various services, including platform migrations, data processing, and independent advice, and helps with the automation wishes of companies. InTrendo IT also offers website management and maintenance, with attention to performance and security, and helps with identifying business cases based on data. | Online Marketing → Website Management 369 | website management 39 it consultancy 52 e-commerce 738 data 5872 | |
| dehagenauw.nl | D.E. Hagenauw | D.E. Hagenauw is an expert in privacy legislation and offers advice, interim support, and DPIAs (Data Protection Impact Assessments) and training. The website provides clear and practical information on how companies and organizations can comply with the GDPR and related legislation, taking into account their specific situation. D.E. Hagenauw also offers training and workshops on the GDPR and related legislation, at a location of your choice. | Privacy → Data Protection 224 Information Technology → IT Security 980 | dpia 17 data protection 30 gdpr 179 interim 732 training 28133 | |
| tri-c.nl | TrI-C | The website emphasizes that technical security measures are insufficient against internal threats, and that employees are a major risk factor. TrI-C develops awareness and offers training and coaching to help employees learn how to protect sensitive business information, with a focus on integrity and developing a ‘moral compass’. The website provides courses and training on Social Engineering, ‘Human Hacking’ methods (phishing, etc.), and the identification of potential threats, with the goal of protecting the company’s identity and minimizing reputational damage. | Information Technology → IT Security 980 Insurance & Risk → Risk Management 1060 | continuity 128 identity 1028 risk 2896 training 28133 | |
| iquni.nl | iQuni | The website offers tests to identify vulnerabilities in websites and servers. iQuni helps companies with privacy compliance and preventing data breaches, especially in light of the AVG regulations. The organization offers customized solutions to increase data security, with periodic checks and advice implementation. | Privacy → Data Protection 224 | avg 145 scan 790 data 5872 security 6655 | |
| inventico.nl | Inventico | The company provides protection against various forms of cyberattacks and ensures the security of clients’ digital information. Inventico offers complete management of a company’s information security, allowing clients to focus on their own business operations. The company, based in Breda, offers various products and services focused on securing digital devices and providing a holistic approach to information protection. | Information Technology → IT Security 980 | cyberattacks 17 information security 217 device 698 collaboration 16036 | North-Brabant → Breda 9003 |
| itdi.nl | ITDI | The company positions itself as a ‘think-tank’ delivering IT solutions that improve a client's competitive advantage and service offerings. ITDI offers services including hardware support, software services, cloud computing, network management, cyber security, and project management, amongst others. Driven by a client-centered approach and a team of skilled IT consultants, ITDI aims to establish long-term partnerships and provide tailored solutions for improved IT infrastructure and security. | Software & Computing → Cloud Computing 1253 | it solutions 181 cloud services 198 cybersecurity 688 project management 3423 | |
| compusol.nl | CompuSol | The site outlines CompuSol's approach to cybersecurity, highlighting its unique solutions and commitment to improving organizational security. It features sections dedicated to 'About Us,' showcasing the website's design and functionality, and 'Portfolio,' illustrating the company's work with client testimonials. The website includes a blog, client testimonials, a team page, and a call to action encouraging visitors to 'get started' with their cybersecurity services. | | testimonials 416 cybersecurity 688 blog 13392 | |
| cyberpeople.nl | Cyber People | The organization focuses on finding specialized cybersecurity professionals such as CISOs, IAM experts, and Red/Blue Teamers. It highlights the increasing challenge organizations face in securing their cyber workforce, particularly concerning the 'when' of cyber attacks rather than the 'if'. Cyber People collaborates with Dutch and global organizations to connect them with qualified cybersecurity talent. | IT Security → Business Security 18 | cyberattack 21 cybersecurity 688 talent 3987 | De Ronde Venen → Mijdrecht 700 |
| bluflare.nl | BluFlare | Jeroen Erkelens is a freelance security expert specializing in the design and implementation of digital security solutions, primarily within the Microsoft ecosystem. He provides independent architectural and strategic advice, conducts technical assessments, delivers training, and presents on cyber security topics. BluFlare supports organizations with shaping, reviewing, and updating their cyber security strategy, ensuring compliance and privacy, and offers services such as cloud security (Office 365), security awareness campaigns, and assessments. | Financial Services → Compliance 399 Legal → Privacy 596 | compliance 506 cybersecurity 688 implementation 1029 privacy 1286 architecture 3223 strategy 9379 | |
| helpikbengehackt.nl | HelpIkBenGehackt.nl | Thousands of websites in the Netherlands are affected by malware annually, and the website provides solutions to this problem. The company, HelpIkBenGehackt.nl, has over 10 years of experience in restoring hacked websites and offers reliable and transparent services. The services include malware removal, preventative measures, and continuous monitoring, with a guarantee of problem resolution within 24 hours. | Online Marketing → Website Management 369 | malware 41 security 6655 | |
| martijnzoet.nl | EDM-Competence Centre | Dr. Zoet’s presentations utilize relatable metaphors and analogies – such as explaining Artificial Intelligence through coffee consumption and Blockchain through a beach walk – to make complex topics accessible to his audience. His research spans diverse fields including business rules management, decision mining, process mining, and artificial intelligence, with a core focus on the impact of these concepts on organizations. As an advisor and coach at EDM-Competence Centre, Dr. Zoet assists corporations, governments, and institutions in identifying and addressing their challenges, emphasizing honest and often challenging advice to drive improvements. | University Resources → University Professors 35 | blockchain 250 artificial intelligence 291 innovation 4659 technology 6816 research 8967 | |
| bmatic.nl | Bmatic Netwerk Security Professionals | Bmatic is a company focused on providing network and security services, emphasizing the finding and retention of specialists. They specialize in Cisco network equipment and Fortinet products, and are an official dealer of Fortinet. Services include network design, management, migration, troubleshooting, security scans, and penetration testing, utilizing certified engineers. | IT → Network Management 702 | cisco 12 migration 349 certification 3380 security 6655 network 11123 | |
| kpescanmij.nl | kpescanmij.nl | The website provides a possibility for self-registration and login via a username and password. Users can request a new password if they forget their old password. The website contains warnings and confirmation questions (e.g., deletion, logout) to ensure the security of user accounts. | | login 160 password 213 education 13471 | |
| curtis-am.nl | Curtis Advies en Management | The website highlights projects related to Rijkswaterstaat (Roads Directorate) and specifically the Basisonderhoudscontract Zee en Delta. A recent project involved analyzing area data for Rijkswaterstaat to prepare for a new contract form, including data structure, risk profiles, and maintenance concepts. Another project showcased the completion of the Nieuwe Sluis Terneuzen, where the company contributed to the development of an Instandhoudingsplan and related documentation. | Nature Conservation → Water Management 1138 | contract 2415 risk 2896 data 5872 maintenance 20093 | Zeeland → Terneuzen 1517 |
| ylect.nl | YLECT | YLECT is comprised of experienced experts in Risk & Compliance, specializing in Anti-Money Laundering (Wwft), FATCA/CRS, Tax Evasion, and Sanctions Law. The company offers consultancy, customized implementations, and project support for organizations seeking to detect and prevent integrity risks related to financial and economic crime. YLECT delivers tailored training courses, quality reports, and supports the selection and recruitment of compliance specialists and fraud detection experts, alongside a broad international network. | Financial Services → Compliance 399 | kyc 15 compliance 506 consultancy 2596 risk 2896 network 11123 training 28133 | North-Holland → Amsterdam 41253 |
| roadmap-ict.nl | Roadmap-ICT | Roadmap-ICT highlights the need for information security in a world where information is vulnerable and offers solutions. The organization provides project management, interim CISO services, and strategic consulting, with a focus on practical implementation and results. Roadmap-ICT offers temporary filling of the role of (C)ISO and data protection officer roles, focused on continuity and immediate availability. | IT → Managed Services 720 | roadmap 125 information security 217 compliance 506 project management 3423 consulting 3639 | |
| secways.nl | SecWays | The website outlines a three-phase approach to application security, focusing on early detection, proactive management, and continuous control throughout the development lifecycle. SecWays offers a range of services including vulnerability scanning, static and dynamic application security testing, secure infrastructure as code, and compliance as code, alongside consultancy services. The company emphasizes the importance of automating security processes within a DevSecOps framework to minimize vulnerabilities and improve overall system security. | Information Technology → IT Security 980 | testing 456 compliance 506 infrastructure 1460 | |
| watchmen-it.nl | Watchmen-IT | The website provides IT solutions such as system management, network management, and cybersecurity, aimed at SMEs. Watchmen-IT emphasizes transparency and reliability, with clear functionalities and fixed amounts to avoid complex IT scenarios. The company started with the mission to provide SMEs with worry-free IT solutions, similar to those offered to large companies, by eliminating ‘black-box’ scenarios and unclear invoices. | IT → Management 346 | network management 235 system management 431 transparency 442 sme 466 cybersecurity 688 it 1539 | |
| bdbit.nl | BDB-IT | The site details the author's passion for cybersecurity, frequently engaging with online challenges and platforms like TryHackMe and Hack The Box. BDB-IT enjoys automating tasks through Ansible playbooks and CI/CD pipelines, seeking to simplify IT infrastructure management and deployment. The author's homelab includes a server (HP Proliant DL380P gen 8) and they are currently working on migrating their website to a Proxmox HA cluster and a new Python-based project. | Technology → IT 3337 | ci/cd 20 ansible 30 cybersecurity 688 server 1036 infrastructure 1460 | |
| edens.nl | Jelle Edens | The site highlights the value of data, similar to gold, but also the potential negative aspects. It discusses the rise of AI in 2025, with examples such as an AI assistant in an office and the reliance on energy sources. The website investigates the risks of phishing attacks and how to protect oneself from them, as well as the addiction to online platforms and the amount of time people spend online. | Data Science & Analytics → Artificial Intelligence 1831 | phishing 34 internet 1678 ai 2181 data 5872 | |
| vitsafe.nl | V-ITSafe Security | The website discusses the crucial role of cybersecurity resilience in an increasingly digital society and the complexity of information security. V-ITSafe Security provides support in areas such as security management, including the development of security policies, risk analysis, and certification (such as ISO27001 and NEN7510). The company also offers advice and consultancy for Security Operations Centers (SOCs), including strategic advice, guidance in procurement processes, and the operationalization of SOC services. Training and workshops are also offered. | Insurance & Risk → Risk Management 1060 | soc 10 risk analysis 217 cybersecurity 688 certification 3380 training 28133 | |
| imavi.nl | Imavi | The company offers security testing, utilizing code reviews and the detection of cross-site scripting vulnerabilities. Vulnerability assessments identify known weaknesses in software, such as missing patches and known exploits. Penetration tests simulate an attempted breach of a system, often using a shell to execute commands. | Information Technology → IT Security 980 | penetration test 17 tester 31 | |
| korsultancy.nl | Korsultancy | Korsunlty.nl is owned and operated by José Korse, a project manager specializing in internet security and consultancy. José Korse possesses extensive experience in project management, particularly in Public Key Infrastructure, Identity and Access Management, and IT security standards and legislation. The company’s work involves a broad range of security projects for both public and private sector clients, encompassing digital signatures, identity management, and other e-security solutions. | Electronics & Components → Computer 4084 | digital signature 10 project management 3423 security 6655 | |
| grc-pro.nl | GRC-Pro Infosec Consultancy | The website highlights Kees Pronk's experience as an information security professional with over 20 years in high-security international and commercial environments. Kees Pronk specializes in a broad range of security areas, including security assessments, risk assessments, compliance, identity and access management, and secure software development. His certifications include CISSP, Certified ISO27001 Practitioner, and CompTIA Cloud, demonstrating his expertise in governance, risk, and compliance. | Information Technology → IT Security 980 | risk assessment 133 compliance 506 certification 3380 | |
| documentdelen.nl | Documentdelen.nl | The website offers a secure way to share files with strong encryption and multi-factor authentication. Users retain control over their files and can retract them at any time. Documentdelen provides tracking and traceability of files and messages, as well as automatic cleanup after a certain validity period. | Business Software → Document Management 328 | encryption 50 files 290 track 416 document 1678 security 6655 | |
| prangerlegal.nl | Pranger Legal | Sjors Pranger is an attorney with extensive experience in law firms and multinational companies as an IP Counsel. The firm focuses on stimulating creativity and innovation by utilizing intellectual property law. Pranger Legal offers services such as drafting and negotiating agreements, guiding IP-related transactions, and handling trademark issues, including the launch of the Nouryon brand. | Law → Intellectual Property 265 Legal → Privacy 596 | trademark 97 intellectual property 109 compliance 506 agreement 1029 it 1539 innovation 4659 | Gelderland → Arnhem 8680 |
| ncrb.nl | Netherlands Cyber Investigation Bureau (NCRB) | The bureau focuses on solutions for OSINT, cybercrime, and digital investigations, including fraud investigation and reputation management. The Online Integrity Scan provides a complete picture of the digital footprint and potential risks, allowing clients to make well-informed decisions. NCRB helps victims of cyberbullying and digital fraud and offers customized digital investigations to uncover hidden information. | Legal → Privacy 596 | osint 12 cybercrime 87 reputation 160 fraud 200 risk 2896 | |
| publicbuyers.nl | Public Buyers Nederland BV | Since 1998, PBNL has been guiding European public procurement processes for municipalities, government agencies, and educational institutions. The company works with carefully selected partners to guide procurement processes from start to finish and prevents legal issues. Public Buyers Nederland BV is a collaboration of consultants and provides legal and administrative support to procuring entities. | Community → Government & Administration 10567 | legal issues 41 procurement 493 partner 4272 communication 10162 | South-Holland → The Hague 19898 |
| ironbox.nl | Ironbox NV | The company offers a range of services including Digital Forensics and Incident Response (DFIR), Cyber defense, and blue team activities. Ironbox aims to empower organizations through customized security solutions, leveraging technology and industry best practices. Their services encompass bolstering defenses, vigilant monitoring, proactive security, and rapid incident response, with a focus on both IT and OT environments. | Information Technology → IT Security 980 | defense 121 cybersecurity 688 monitor 1063 security 6655 | |
| e-aware.nl | E-Aware | The company helps organizations take their first steps in cybersecurity by mapping vulnerabilities, monitoring systems, and training personnel. According to European guidelines (NIS2), many organizations are required to have a cybersecurity policy and conduct a risk analysis, and E-Aware provides support through ongoing monitoring and annual certifications. The website covers topics such as human errors in cybersecurity, the security of digital devices, and the development of incident response plans. | Insurance & Risk → Risk Management 1060 | vulnerability 149 incident 335 monitor 1063 personnel 1084 risk 2896 training 28133 | |
| kawkab.nl | kawKab | The site provides a range of services, including Custom Services For Your Business, Cloud Storage Security, Data Protection, Cyber Security, Hacking Protection, Website Protection, Identifying Threats, Risk Assessment, Network Security, Server Monitoring, and Email Protection. The company positions itself as a trusted partner in cyber security and the IT sector, emphasizing secure business operations. The website features sections such as ‘services’, ‘case studies’, ‘pages’, ‘Blog’, ‘Contact’, and social media links, indicating a broader online presence and potential marketing efforts. | Information Technology → IT Security 980 | network security 22 risk assessment 133 cybersecurity 688 | |
| sekury.nl | Sekury | Sekury provides cybersecurity services for data in transit, including LAN/WAN/DNS/DHCP/Virtual (cloud) networks and integrated security. The website describes Sekury's mission to help customers create safe and trustworthy digital experiences, both business and personal. Sekury combines expertise and passion to elevate the security of IT infrastructure and provides advice, projects, assessments, and architectural designs for a secure, seamless, and connected approach. | Information Technology → IT Security 980 | infrastructure 1460 cloud 1527 security 6655 network 11123 | |
| theidiotcompany.nl | The Idiot Company | The company's mission is to create a connected world through intelligent data, secure sensor solutions, and innovative applications. They utilize smart sensor technology, cloud solutions, and algorithms to facilitate the convergence of the digital and physical worlds, termed the 'Internet of Things (IoT)'. The company draws inspiration from figures like Albert Einstein, Jane Frost, Ellen Johnson Sirleaf, and Yoda, incorporating their philosophies into their approach to innovation and sustainable practices. | Smart Home & IoT → Internet of Things 66 | iot 183 insights 976 cloud 1527 innovation 4659 data 5872 | |
| upax.nl | UPAX.NL | The website offers various services including risk analysis, backup and recovery, and training programs. UPAX.NL has assisted organizations in improving their cybersecurity processes, leading to increased trust and peace of mind, and compliance with regulations. The website highlights experience, in-depth industry knowledge, the NIST Framework, and specialization in backup solutions as key elements of their approach. | Technical → Security 408 | risk analysis 217 backup 494 cybersecurity 688 | North-Brabant → Valkenswaard 1179 |
| familiebuckens.nl | This site | Strong evidence suggests that the hack at the Public Prosecution Service (Openbaar Ministerie) is linked to Russia, with hackers potentially having access to justice department computers for weeks. The website addresses the situation surrounding vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway, and provides guidance for handling these risks. A cybersecurity incident at Dior has led to data breach notifications for U.S. customers, with personal information potentially compromised. | Politics → Justice 13 | hack 36 threat 62 vulnerability 149 | |
| mikkievanfalier.nl | Mikkie van Falier | Mikkie van Falier is an IT security professional specializing in guidance, auditing, and implementing security controls. She possesses a diverse range of certifications including ISO/IEC 27001 Lead Auditor, eJPTv2, MS-500, AZ-500, SC-900, InsightVM Certified Professional, and CISSP, demonstrating her expertise in various security domains. Her experience encompasses auditing IT-security controls, implementing resilience, and working with various frameworks and technologies, as evidenced by her completed courses and project examples. | Information Technology → IT Security 980 | microsoft 183 framework 283 audit 622 control 911 certification 3380 security 6655 | |
| cybersquare.nl | CyberSquare | The website highlights the increasing need for cybersecurity in an increasingly digital world. CyberSquare offers a service that involves conducting phishing simulations to improve awareness and prevention of phishing attacks. The company utilizes a personalized approach, tailoring simulations to the specific needs of the client, and providing a dashboard for real-time insight into simulation results. | IT Security → Business Security 18 | scenario 281 dashboard 1374 awareness 1735 report 4551 security 6655 | |
| certecom.nl | CERTECOM | The website describes the need for an ‘end-to-end’ security approach in light of increasing complexity and device-centralization, emphasizing the protection of data itself. CERTECOM highlights the relevance of ‘zero trust’ architecture and XDR (extended detection and response) solutions, including AI-driven monitoring and analysis of account behavior to mitigate risks. The site emphasizes a risk-based approach to information security, managing threats, and providing practical security advice and solutions to organizations, based on 20 years of experience in cybersecurity. | | ai 2181 risk 2896 architecture 3223 data 5872 security 6655 | |
| digidings.nl | digidings.nl | The website highlights the challenges of digitalization, such as cybersecurity, privacy, and evolving regulations, offering solutions. It emphasizes the importance of real-time data processing and connecting clients, products, people, and activities to improve business results. The website advocates for digital innovation, integration, and resilience within organizations to gain a competitive advantage and reduce risks. | Enterprise Solutions → Enterprise Software 103 | business results 29 digitalization 757 resilience 1091 innovation 4659 data 5872 | |
| leanengineering.nl | LEO - Lean Engineering Org | The website details LEO's offerings as a CRAFT Lean management initiative, emphasizing their experience in pioneering Lean Engineering and expanding their services. Their approach, known as the ‘three-dimensional model,’ focuses on People (ownership and continuous improvement), Planning (stable flow and capacity management), and Process (robust standards). LEO offers various solutions, including a Lean Scan (diagnostic scan), consulting on specific issues, and targeted training modules, with a CRAFT Transformation Approach to ensure efficient and sustainable change. | Engineering → Industrial Engineering 270 | transformation 1081 consulting 3639 training 28133 | |
| sygnius.nl | SYGNIUS B.V. | The website highlights the increasing digitalization and the associated cyber risks, with a significant portion of infrastructure being vulnerable. A crucial step to manage these risks is to gain insight into the potential vulnerabilities of websites, networks and home workplaces. Sygnius offers scanning services, certification, penetration testing and CISO-as-a-Service to help organizations improve their security level. | Security → Antivirus Software 25 | cybercrime 87 scan 790 it 1539 security 6655 network 11123 | |
| cybersecurityzeeland.nl | Cybersecurityzeeland | The company provides a wide range of security services, including detection, incident response, GDPR compliance, and vulnerability detection. A key aspect of their offering is 24/7 detection of suspicious activities in networks, similar to a fire alarm, and testing of employee security awareness. Cybersecurityzeeland.nl has years of experience in IT security, support, and development, and is a Microsoft Partner with Silver Certified Partner status. | Security & Surveillance → Security Services 445 | incident 335 certification 3380 employee 4429 environment 4873 security 6655 network 11123 | Zeeland → Terneuzen 1517 |
| it-talentic.nl | IT-Talentic | The company has experience with complex migration projects in sectors such as Financial Markets, Energy Trading, and the Compliance domain. IT-Talentic emphasizes the importance of diversity and strengthening teams both professionally and personally, resulting in a solid portfolio of assignments. The company encourages internal initiatives and contributes to scientific knowledge by hosting lectures and workshops at conferences. | Software Development & Engineering → DevOps 429 | migration 349 diversity 492 compliance 506 knowledge 3528 software 8291 | |
| everdina-groen.nl | Everdina Groen | The website includes an overview of Everdina Groen, her background, and interests. There is a blog section dedicated to cybersecurity awareness, focusing on the increasing relevance of this topic in the digital age. Visitors can easily contact Everdina Groen and follow her via social media links. | Social → Personal Blog 2718 | interest 911 blog 13392 | |
| 01it.nl | 01IT.nl | The website describes the developer's experience in building and managing websites, from design to maintenance, utilizing a fast Dutch server to ensure optimal performance. The owner has completed a traineeship as a BI Specialist, enabling them to perform data analysis and visualize data in tools like PowerBI, leading to better decision-making. The website also promotes the owner's expertise in SharePoint administration, from setup to maintenance, and their skills in content creation and app development. | Data Analysis → Business Intelligence 1002 | sharepoint 83 data analysis 211 application 3377 | |
| thijskromhout.nl | Thijs Kromhout | Thijs Kromhout has been active in the ICT field since the 1990s and has gained extensive experience over the years. The website contains a blog in which Kromhout describes his work related to internal information security and providing associated services to clients. Kromhout is also interested in new technologies and emphasizes the value of a thoughtful, structured approach in his work. | Information Technology → IT Security 980 | information security 217 technology 6816 blog 13392 | |
| srwebsolution.nl | SR Websolution | SR Websolution offers a wide range of services, including IT management, server management, web design, web application development, hosting, and consultancy. The website showcases a portfolio of various projects, such as webshops, informative websites, and web applications for different sectors, including healthcare and transportation. SR Websolution has been active since 2009 and has recently shifted its focus to web applications, with the aim of providing clients with 24/7 access to their data. | IT → Management 346 Computer → Computer Support 1003 | it-management 23 web application 609 hosting 3125 consulting 3639 webdesign 4092 webshop 8648 | |
| securitycarriere.nl | SecurityCarriere | The website covers a broad range of cybersecurity topics, including certifications like CISSP, CISM, and CISA, as well as frameworks such as ISO27001 and NIST. SecurityCarriere.nl offers consulting services related to Information Security Management Systems (ISMS), disaster recovery, business continuity, and identity and access management. Furthermore, the site includes resources on IT investigations, security architecture, regulatory compliance (covering international standards), and change management models. | Insurance & Risk → Risk Management 1060 | iso 33 compliance 506 cybersecurity 688 cloud 1527 risk 2896 security 6655 | |
| dizzrupt.nl | Dizzrupt | The website highlights the increasing importance of cybersecurity and privacy within a rapidly changing technological landscape. Dizzrupt specializes in helping clients innovate in these areas, developing strategic propositions related to the technologies. The site includes information on security practices, privacy protection, and terms and conditions, and encourages ethical vulnerability reporting. | Business Strategy → Business Development 730 | business development 121 blockchain 250 cybersecurity 688 privacy 1286 innovation 4659 security 6655 | |
| if1.nl | ONE | The ONE Conference discusses the key developments in cybersecurity, with a focus on new legislation such as NIS2, and preparing for cyber threats from criminal and state actors. A recent fine for Transavia, caused by a hack through weak passwords, illustrates the seriousness of data breaches and the need for strong security. The European Union is taking steps to limit cybercrime through ‘smart’ devices, aiming to better protect consumers against online threats by banning insecure devices. | International Cooperation Projects → European Union 117 | cyberattack 21 nis2 27 eu 57 cybersecurity 688 | |
| securitywizard.nl | Securitywizard | The website contains articles on information security. The website provides insights into the author, Irmin Houwerzijl, and his background and expertise in IT and information security. The website presents recent blog posts on topics such as the General Data Protection Regulation (GDPR), network and information security, cloud security, ISO27001 and other related aspects of cybersecurity. | Privacy → Data Protection 224 | information security 217 risk analysis 217 cloud 1527 article 6000 | |
| whitehatsecurity.nl | Whitehat Security | Research indicates that a large proportion of websites and webshops contain serious security vulnerabilities, and WHS offers a free scan to help users identify these issues. WHS has uncovered security vulnerabilities in prominent organizations, resulting in rewards and bug bounties, highlighting the company's expertise. The website offers scans for websites, webshops, applications, APIs, and servers, providing users with immediate results of their security score. | Information Technology → IT Security 980 | scan 790 server 1036 application 3377 security 6655 webshop 8648 | |
| vodax.nl | Vodax IT | The company specializes in delivering tailored cybersecurity and IT solutions. Vodax IT combines IT management with cybersecurity to create a secure and efficient IT environment for its clients. The website offers services such as IT management, cybersecurity advice, risk analysis, and information security to protect businesses from data breaches and attacks. | Technology → IT Solutions 311 | it management 150 it solutions 181 cybersecurity 688 risk 2896 | |
| itsrene.nl | It’s René | René identifies as a hands-on solution architect with a background in software engineering, specializing in Java, iOS, and Android development. In his role as solution architect, he has collaborated closely with teams, acting as a tech lead, defining roadmaps, communicating them to clients and developers, and mentoring development teams while identifying and implementing appropriate tools. René's background encompasses a wide range of technical skills, including software engineering, service engineering, and problem-solving, and he has experience in diverse industries like banking, oil & gas, and the public sector. | Software Development & Engineering → Software Architecture 18 | roadmap 125 industry 1780 architecture 3223 | |
| ccgd.nl | GD Consulting & Coaching | Gauri Deoras provides consulting and coaching services across areas such as Regulatory Affairs, Diversity & Inclusion, Market Analysis, and Business Development. Her background includes experience in various sectors and industries, combined with international travel and diverse interactions with different cultures. Gauri’s approach emphasizes analytical insights, collaboration, and personalized solutions, aiming to empower clients to achieve their goals and navigate challenges. | Social Issues → Diversity 441 | regulatory affairs 21 diversity 492 challenge 1697 consulting 3639 strategy 9379 coach 25810 | North-Holland → Amsterdam 41253 |
| waarneming-test.nl | Techaro | The website's administrator uses Anubis to safeguard the server from aggressive scraping by AI companies. This scraping activity results in website downtime and makes resources unavailable to users. Users must enable JavaScript or disable plugins like JShelter to bypass the Anubis protection. | Web Design & Development → Web Technologies 34 | plugins 123 javascript 238 | |
| itiphish.nl | CaptureTech IT Services | The company offers a modular NOC/SOC platform that provides 24/7 workplace, network, and cloud management, proactive security and compliance, with integration of Microsoft 365 and Azure. CaptureTech offers various services, including IT/OT consultancy, IT infrastructure analysis, Microsoft licensing advice, backup & recovery solutions, and cybersecurity services such as Hacktests and NIS2 assessments. The website emphasizes a customer-centric approach, with a focus on transparency, scalability, and a human approach to IT management, including offering coffee and quick response times. | IT → Managed Services 720 | nis2 27 microsoft 183 security 6655 network 11123 | |
| kinginvest.nl | Kinginvest | The company offers consultancy services for business challenges, with a particular focus on assisting clients with moving their operations to or from the Netherlands. Kinginvest provides implementation management services, including interim management during the initial phase of establishing a new operation or changing an existing one within an international framework. Leveraging 40 years of experience in international business, Kinginvest utilizes its extensive network of specialists and contacts to facilitate smooth transitions and develop practical solutions for client needs. | Supply Chain & Logistics → International Trade 1156 | implementation 1029 netherlands 1376 consultancy 2596 network 11123 | |
| mverkleij.nl | Martijn Verkleij | The primary focus of the website is Martijn Verkleij's Master thesis defence scheduled for August 25, 2025, concerning a toolkit for network measurements on bandwidth brokers. Another section details a tutorial on using Caddy for web hosting, addressing considerations for personal, small business, and enterprise setups, including SSL certificates. Finally, the website provides access to a KNMI weather observation archive, containing data from weather stations in the Netherlands and select overseas locations, acknowledging some data gaps due to server outages. | Information Technology → IT Security 980 | caddy 13 thesis 228 archive 2067 network 11123 | |
| dc-security.nl | DC-Security | The website features a blog with weekly new articles about ethics, privacy, and security in the context of modern technology. A recent blog post discusses the vulnerability of Dutch undersea internet cables to sabotage, in the context of the Nord Stream gas pipeline attacks. Another blog post describes the risk of hackers being able to unlock and start Honda cars by uncovering the codes in the car keys. | Technical → Security 408 | ethics 119 privacy 1286 internet 1678 security 6655 technology 6816 car 10865 | |
| thomduran.nl | Thom Duran | The website contains write-ups that Thom Duran has developed for different cybersecurity machines and modules, such as Mirai (Hack the Box: Labs), Malware Analysis (TryHackMe), Incident Response and Forensics (TryHackMe) and Bank of America Track (HTB: Labs). These write-ups document the process and findings of Thom Duran's Blue Teaming research. Additionally, the website includes a plan of action for a personal security specialization. | Student Life → Students 352 | lab 66 cybersecurity 688 module 971 plan 2566 | |
| caconym.nl | Caconym | Caconym defines himself as a 'kakonym,' an incorrect name for something, stemming from Greek roots, and simultaneously a nickname for a cyber-nerd. His interests encompass a broad range including Information Security, NetSec, Unix, Homelabs, Sci-Fi, and Lo-Fi beats, reflected in his hobbies like Blade Runner and Star Wars. Caconym's professional experience includes over five years in InfoSec, covering areas such as Log Management, Blue Teaming, Cyber Threat Intelligence, and SIEM management, complemented by multiple security certificates. | | information technology 24 information security 217 security 6655 | |
| marfnl.nl | Marfnl | The website includes sections for a CV, projects, GitHub, and LinkedIn, providing a comprehensive overview of Marvin's professional profile. It details security audits, vulnerability prevention, and security analysis services offered, emphasizing a structured approach to security solutions. The contact information is provided, including the address: 1234 Divi St. #1000, San Francisco, CA, along with operating hours. | Information Technology → IT Security 980 | security services 13 security solutions 23 | |
| shop.trustico.nl | Trustico® | The website offers a wide selection of SSL certificates, including PositiveSSL, Sectigo, and Trustico® certificates, catering to various validation types (DV, OV, EV) and domain configurations (single site, multi domain, wildcard). Users can obtain SSL certificates through a free trial, with competitive pricing and potential savings compared to supplier list prices. The site also provides certificate conversion tools and tracking services. Beyond SSL certificates, Trustico® offers partner programs, affiliate accounts, and support resources such as FAQs, technical documentation, and renewal information. | Technical → Security 408 | ssl certificate 89 partner 4272 | |
| radboudinstituteof.pwning.nl | Radboud University | The website hosts a calendar of past and upcoming cybersecurity events, including CTFs organized by the Radboud University’s CTF team. It features writeups and tutorials on various pwn challenges, such as escape techniques from pyjail environments (asteval sandbox), and specific challenges from CTFs like UIUCTF and HTB. The site also offers a workflow guide designed to assist newcomers in tackling pwn challenges, acknowledging the complexities associated with the setup and environment required for these types of competitions. | Research & Academia → Academic 215 | ctf 10 workflow 407 challenge 1697 assembly 1733 | |
| blog.pentiago365.nl | Pentiago 365 | The blog primarily details the author’s personal journey to improve the security and configuration of their own Microsoft environment, utilizing tools and techniques related to Microsoft Entra. Specific posts cover topics such as Zero Trust Assessments, removing old devices from the Windows Security passkey prompt, and password delivery challenges in hybrid environments. Additionally, the blog features a framework called Maester.dev, an open-source tool for monitoring critical security aspects of a Microsoft tenant. | | framework 283 security 6655 | |
| hackathon-2025-jubileumeditie.yellenge.nl | Police Hackathon | The hackathon takes place on Friday, October 10, 2025, at Microsoft Netherlands, Schiphol, and offers participants the opportunity to work on real police cases. Participants can leverage their skills in various challenges, including cybercrime, fraud, missing persons, and dark web investigations, and expand their network with professionals. The organization encourages innovation and collaboration and invites developers, researchers, lawyers, students, and creative thinkers to participate and contribute to a safer digital Netherlands. | Government & Administration → Police 215 | cybercrime 87 crime 148 researcher 220 developer 406 police 480 collaboration 16036 | Haarlemmermeer → Schiphol 2163 |
| spipm.graa.nl | Spip | The blog features articles on topics like text message compression techniques, using IntelliJ plugins for secrets management and obfuscation, and participating in the BraekerCTF 2024 hacking competition. It includes an advisory about an outdated PasswordUtil class in IntelliJ plugins and methods for writing effective pentest reports. The blog also explores cryptographic control, password cracking using Argon2, and strategies for cost-effective penetration testing, as well as a deep dive on cracking Oracle Apex. | Programming → Software Development 45 | ctf 10 cryptography 31 plugins 123 report 4551 | |
| winfriedconsulting.nl | WINFRIED CONSULTING | Winfried Hettinga provides consultancy services, leveraging project management and organizational skills to connect departments, companies, and countries. His background includes a combined study in electronics and electrical engineering, followed by service in the Royal Air Force and various roles in marine electronics installation and repair, as well as professional audio-visual equipment maintenance. He has spent over 22 years in the mobile network infrastructure and service business, holding leadership positions in project management, customer care, and global delivery. | Radio & Communication → Telecommunications 1361 | electronics 971 project management 3423 | Gelderland → Arnhem 8680 |
| yourally.nl | YourAlly | The company offers consulting services, including advice on establishing the fundamentals of information security, standards such as ISO 27001, and specific security measures. YourAlly provides outsourcing of information security experts on a flexible and customized basis, as well as interim placement of security and privacy experts. The company describes itself as a growing security startup with a fresh and innovative approach, emphasizing a personalized approach to advice, unlike ‘paper perfection’ offered by other providers. | Business & Management → Certification 364 | information security 217 outsourcing 305 interim 732 consulting 3639 security 6655 | |