Cloud Computing & Infrastructues
Architecture & Build
Audit & Control
About Alter Solutions Benelux
About the Alter Solutions Group
Corporate Social Responsibility
Work at Alter Solutions
Choose a tag
IT Security Check
Security Threat Modeling
2 November 2022
We are a Great Place to Work!
Alter Solutions receives Great Place to Work© certification in Belgium, Portugal, France, and Germany. All the analysed dimensions – credibility, respect, equality, pride and ...
9 August 2022
The Red Team Approach: Overall assessment of your security
This approach is a practical demonstration before a management committee that aims to illustrate what a computer attacker can do to their systems. This offensive approach to ...
4 August 2022
What is Site Reliability Engineering? – An overview
The term Site Reliability Engineering (abbreviation: SRE) is frequently used within the framework of collaborative models which focus on cooperation and greater agility in IT. But ...
26 July 2022
Building a Kubernetes blueprint
In my current project, we are building a platform based on the Amazon Kubernetes offering (EKS), our goal is to provide a blueprint to deploy a fully operational kubernetes ...
12 July 2022
AVIF Image Format – What is it and can it improve performance of Web Applications?
30 June 2022
Training Machine Learning Models with TPUs
One of many great things about working at Alter Solutions is, through its extensive training program, the opportunity to learn new skills and technologies, such as, the ...
23 June 2022
EDR and Antivirus, what are the differences between them?
Are conventional antivirus solutions dead? The advanced detection and threat response capabilities provided by EDR (Endpoint Detection & Response) is not disputed, however, it ...
7 June 2022
Why did $LUNA crash? And how did it happen?
You have probably heard about the cryptocurrency “$LUNA” which lost more than 99% of its value in just a few days. The purpose of this article is to explain as best we can what ...
IT Security Check
18 May 2022
Why SMEs should carry out an IT security assessment now
WHAT IS AN IT SECURITY ASSESSMENT?