Topics:
We are pleased to announce membership in FIRST and TF-CSIRT, which demonstrates the maturity of our Incident Response Team delivery.
Jacob Herbst’s appointment as chair in the Cybersecurity Council is in line with Dubex’s continued work to enhance digital security in Denmark.
We help with security products, governance, implementation, analysis, operational support. We offer services to help our customers quickly detect and respond to cyber attacks. 25 years of experience.
Version2 welcomes IT managers and security specialists to two exciting days in Copenhagen. More than 4,000 visitors, 80 exhibitors and over 100 seminars will all be contributing to more awareness and knowledge about IT security, cloud solutions, compliance, and cutting edge technologies.
Email spoofing is a form of cyber-attack commonly used in phishing attacks and scams. Its purpose is to trick users into thinking a message came from a person or entity they trust. The manipulated email is sent by a hacker and may contain malicious links or false information.
This content is password protected. To view it please enter your password below.
On this seminar Dubex A/S alongside Check Point and Bestyrelsesforeningen will be hosting an exclusive event focusing on the cooperation of management and board of directors.
In today’s digital age, cybersecurity threats are ever-present, and enterprises need to protect their internal resources from unauthorized access. Privileged Access Management (PAM) helps enterprises from cyberthreats by monitoring, auditing, and identifying privileged access.
We are at the beginning of a new year, so now is a good opportunity to predict some of the challenges we are facing in the coming year. Ransomware continues to be the type of attack with the biggest impact on our customers
We've witnessed significant changes to the geopolitical landscape with the Russian war against Ukraine and the growing tensions between China and the West. This past year has caused major changes to the global world order and with it, also the cybersecurity landscape.