What Is the Schrems II Ruling?

Everything you need to know about the Scherms II ruling and subsequent invalidation of the EU-US Privacy Shield for EU, US, and UK-based companies.  For more information on what the Scherms ll decision means for your business, whether you or your hosting provider are European or US-based, refer to What Does the Schrems ll Ruling Mean […]

How to Protect Your Personal Data: An Interview with Stef van der Ziel

We sat down with Stef van der Ziel, Founder and CEO of Jet-Stream and Streaminar (and long-time Leaseweb customer), to discuss all things privacy: what it means, why you should care, and what you can do to increase your personal data protection now.    Tell us about your background. How do you know so much about personal data protection? I began producing live streams on the Internet in the early 1990s and have […]

Partners in the Storm: Elevating Your Disaster Recovery Plan

Summer months often bring excitement for—and memories of—light-hearted joys such as long, warm days, outdoor activities with friends and family, and the simple pleasure of ice cream on a hot day. But while the beginning of summer often is filled with light-heartedness, the late-summer months mark the beginning of hurricane season and natural disaster preparedness […]

How To Run Your Own Secure Video Conferencing Tool

The use of virtual collaboration tools has skyrocketed in the past few weeks. Microsoft Teams has seen a 500% increase in meetings, calls and conferences in China since January 31. Skype had a 70% increase in users in one month. The app Houseparty hit over two million downloads in one week alone at the end […]

What are the infrastructure requirements for Artificial Intelligence?

In the past few years, I have been asked several times about how Leaseweb positions itself towards Artificial Intelligence (AI). As Leaseweb is mainly focusing on delivering fast and reliable Infrastructure as a Service, we’re not offering AI services directly to our customers.   Having said that, we work with many customers who deliver AI services to their end user, […]

Which network firewall setup is best for your private cloud?

A network firewall protects hosted applications and data in a private cloud. They operate as the core of your network security, act as an access control point of all traffic, and eliminate risks of unknown malicious traffic. When thinking about which network firewall setup to install, you need to make the following decision: Do you […]

3 Ways to Safeguard Your Company From a Ransomware Attack

Ransomware attacks have been around for decades, and they continue to wreak havoc on systems around the world. However, gone are the days when biologists spread the ransomware attack PC Cyborg through floppy disks to innocent victims. Attacks have gotten bigger and more dangerous; we are now all too familiar with attacks like Osiris, CryptoLocker, […]

Implement API Security Measures to Protect Your System

If you are familiar with platform security policies, chances are you’ve heard of the Open Web Application Security Project (OWASP). This non-profit organization focuses on improving software security and makes it a primary mission to ensure software security is visible, which makes it easier for organizations and individuals to make informed decisions with their software […]