Cyber4Z in short

Cyber4Z started in 2015 with two specialists experienced in the cybersecurity domain. We now have a team with various capabilities in the field of strategic and tactical design of cyber security, IT, Privacy and Blockchain technology.

In addition, we are involved in technical and tactical implementations of complex security challenges that focus on the acceptance of new technologies in a pragmatic way. With our expertise and experience, we can guarantee the business objectives of our clients. These are widely determined by laws and regulations, customer requirements and rules of compliance.

  • Predict

  • Prevent

  • Detect

  • Respond

  • Remediate

Who are we?

Our team consists of certified professionals. Quality is our top priority. The technical and tactical implementations we deliver from the strategic design can be externally certified against the ISO9001, ISO27001, NEN7510 or other standards. Therewith we can have our quality tested externally as well. In addition, we provide operational knowledge when it comes to technical security assessments such as penetration tests, project management, SOC / SIEM propositions with connecting services such as log management, vulnerability and compliance management, patch management, training in the field of privacy, security and blockchain technology.

More about Cyber4Z

Our clients


Monthly cybernote: November 2020


A world without passwords is near!

With passwordless authentication, users don't have to remember or enter passwords to log in. Quite progress, because the use of passwords invariably entails security problems. That is why - especially for endpoints - the combination with two or multi factor authentication is recommended. Preferably the strongest according to eIDAS legislation, namely token plus digital certificate, says Jordan van den Akker, Business Security Consultant at AET Europe. He thinks it is important not to use One-Time Passwords (OTP) tokens, because according to him recent attacks have shown that a code can be easily intercepted.

While personal user passwords can be protected using passwordless methods, those methods are becoming increasingly popular, such as digital certificates on carriers such as a USB, card or other carrying device. Of course compliant with various legislation and international developments, such as eIDAS, GDPR and FIDO. With this approach, IT and security teams can be sure that:

  1. User access is secured and no reused or shared passwords are in circulation;
  2. Attackers cannot perform phishing attacks for users' passwords or access;
  3. User authentication information is never stored in the system like a password would be. So even someone with access to the system cannot figure out the credentials, making passwordless solutions an important security advantage.

In the current market, these security solutions for secure authentication and management of digital certificates on data carriers are already available and are already widely used for the security of critical systems. These certificates and tokens can also be clearly registered, validated, managed, managed and revoked.

Source: www.securitymanagement.nl