<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Jasper Bernaers</title>
    <link>https://jasperbernaers.com</link>
    <description>Microsoft Cloud &amp; Security Expert. Articles on cybersecurity, cloud architecture, compliance, and the Belgian digital landscape.</description>
    <language>en-us</language>
    <managingEditor>contact@jasperbernaers.com (Jasper Bernaers)</managingEditor>
    <webMaster>contact@jasperbernaers.com (Jasper Bernaers)</webMaster>
    <lastBuildDate>Wed, 06 May 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://jasperbernaers.com/feed.xml" rel="self" type="application/rss+xml"/>
    <image>
      <url>https://jasperbernaers.com/favicon-32x32.png</url>
      <title>Jasper Bernaers</title>
      <link>https://jasperbernaers.com</link>
    </image>

    <item>
      <title>The Ransomware Trap: Why Paying the Hacker Is Always a Losing Game</title>
      <link>https://jasperbernaers.com/the-ransomware-trap-why-paying-the-hacker-is-always-a-losing-game/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/the-ransomware-trap-why-paying-the-hacker-is-always-a-losing-game/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>Paying a ransom isn&apos;t a business solution — it&apos;s a gamble where the house always wins. Why meeting ransom demands funds future attacks, rarely works, and what to build instead.</description>
      <category>Ransomware</category>
      <category>Cybersecurity</category>
      <category>Opinion</category>
    </item>

    <item>
      <title>Belgium Under Digital Pressure: The 2026 Reality of Cyber Incidents, Breaches, and Data Extraction</title>
      <link>https://jasperbernaers.com/belgium-cyber-2026/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/belgium-cyber-2026/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>A grounded analysis of Belgian cyber incidents in 2026 — ransomware, healthcare supplier compromise, public sector disruption, and why the question is no longer whether you&apos;ve been hacked, but which part of you is already being used.</description>
      <category>Belgium</category>
      <category>Cybersecurity</category>
      <category>Threat Intel</category>
    </item>

    <item>
      <title>The Evolution of Consent: EU&apos;s 2025 Digital Omnibus Package and its Impact on Web Architecture</title>
      <link>https://jasperbernaers.com/eu-digital-omnibus-2025/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/eu-digital-omnibus-2025/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>A technical breakdown of Articles 88a &amp; 88b — machine-readable consent signals, the low-risk cookie whitelist, and how the Digital Omnibus Package reshapes web architecture for developers and compliance teams.</description>
      <category>GDPR</category>
      <category>ePrivacy</category>
      <category>EU Law</category>
    </item>

    <item>
      <title>Actionable Steps to Decrease Your Security Risk</title>
      <link>https://jasperbernaers.com/actionable-steps-to-decrease-security-risk/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/actionable-steps-to-decrease-security-risk/</guid>
      <pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>Cloud security steps deployable in hours — MFA via Security Defaults, Defender for Identity, Endpoint protection, DKIM/SPF and phishing defence.</description>
      <category>Security</category>
      <category>Azure AD</category>
      <category>Defender</category>
    </item>

    <item>
      <title>Technical High-Level Modern Workplace Implementation with Microsoft 365</title>
      <link>https://jasperbernaers.com/technical-high-level-modern-workplace-implementation-with-m365-e3-e5/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/technical-high-level-modern-workplace-implementation-with-m365-e3-e5/</guid>
      <pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>A 16-step technical guide — Azure AD Connect, Exchange migration, OneDrive, Teams, Endpoint Manager, Windows Autopilot, GPO migration, Azure Migrate and SecOps automation.</description>
      <category>Microsoft 365</category>
      <category>Implementation</category>
      <category>Architecture</category>
    </item>

    <item>
      <title>How to Build a Zero Trust Modern Workplace with Microsoft 365</title>
      <link>https://jasperbernaers.com/how-to-build-your-zero-trust-modern-workplace-with-microsoft-365/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/how-to-build-your-zero-trust-modern-workplace-with-microsoft-365/</guid>
      <pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>Strategic high-level guide to shifting from traditional infrastructure to a cloud-first Zero Trust workplace — identity, devices, services, data and network.</description>
      <category>Zero Trust</category>
      <category>Microsoft 365</category>
      <category>Strategy</category>
    </item>

    <item>
      <title>The Multi-Factor Authentication Struggle and the Solution</title>
      <link>https://jasperbernaers.com/the-multi-factor-authentication-struggle-and-the-solution/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/the-multi-factor-authentication-struggle-and-the-solution/</guid>
      <pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>MFA implementation done right — Zero Trust foundations, Conditional Access, passwordless authentication and change management.</description>
      <category>MFA</category>
      <category>Identity</category>
      <category>Azure AD</category>
    </item>

    <item>
      <title>Microsoft is Delivering Automated Security Operations (SecOps) for Any Organization</title>
      <link>https://jasperbernaers.com/automated-security-operations-delivered-by-microsoft-m365e5-secops/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/automated-security-operations-delivered-by-microsoft-m365e5-secops/</guid>
      <pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>How Microsoft 365 E5 enables automated SecOps for SMBs — Tier 1 &amp; 2 automation, Identity Protection, Conditional Access and why you don&apos;t need a 24x7 SOC team.</description>
      <category>SecOps</category>
      <category>Microsoft 365</category>
      <category>Automation</category>
    </item>

    <item>
      <title>Top 10 Security Recommendations While Working From Home</title>
      <link>https://jasperbernaers.com/the-top-10-security-recommendations-we-should-consider-while-working-from-home/</link>
      <guid isPermaLink="true">https://jasperbernaers.com/the-top-10-security-recommendations-we-should-consider-while-working-from-home/</guid>
      <pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate>
      <author>contact@jasperbernaers.com (Jasper Bernaers)</author>
      <description>10 practical security steps for remote workers — MFA, patching, device management, Cloud App Security, information protection and more.</description>
      <category>Remote Work</category>
      <category>Security</category>
      <category>Microsoft 365</category>
    </item>

  </channel>
</rss>
