Author: panthers64

My New Low-Water Aquascape: A Paludarium-Inspired Setup
I’ve been wanting to try something different with my aquarium setup, and this time I decided to venture into the world of low-water aquascaping. Instead of the traditional fully-filled tank, I opted for an aquarium filled only about one-third with water, creating a unique environment that bridges the gap between aquatic and terrestrial plant life.…

Understanding Phishing and Malware: A Simple Guide
In today’s digital world, staying safe online can feel overwhelming, especially if technology isn’t your forte. You don’t need to be a computer expert to protect yourself from cyber threats. This guide is written specifically for everyday people who want to understand the most common dangers lurking on the internet without getting lost in technical…

Understanding Jamf Trusted Access: Your Digital Security Guard
If you’ve ever traveled through an airport, you know the drill: show your ID, scan your boarding pass, walk through security, and only then do you get to your gate. Nobody just wanders onto a plane. There’s a system in place to make sure only the right people get access to the right places. Jamf…

Two Days at Fleet Expo Utrecht: A Different Side of Electric Driving
This week, on November 12 and 13, I had the opportunity to represent the Vereniging Elektrische Rijders at the Fleet Expo in de Jaarbeurs in Utrecht. As a volunteer at VER, I’m used to answering questions about electric driving, sharing experiences, and helping people take their first steps into the world of EVs. But this…

Platform SSO Revisited: The Future of Enterprise Mac Authentication
All credits for the information in this recap that I made, go to Joel Rennich, who presented this topic at MacSysAdmin 2025 in Sweden. This recap is based on his presentation during this event. Why this recap? Because it’s currently a much-discussed topic in the Macadmins space. Platform SSO continues to evolve as Apple’s vision…

EV Experience 2025: A Weekend of Electric Enthusiasm, Connection, and Discovery
Last week’s EV Experience was nothing short of extraordinary. Representing Vereniging Elektrische Rijders (the Dutch Electric Drivers Association) over two inspiring days, I left the event energized, both literally and figuratively, by the passion and curiosity of everyone involved. A Hub for Electric Mobility Conversations The atmosphere at EV Experience was electric in every sense…

October: Cybersecurity Awareness Month. Why It Matters to You and Me
We are entering autumn and It’s also Cybersecurity Awareness Month (CSAM), a time when tech enthusiasts, professionals, and everyday users like you and me come together to sharpen our digital defenses. For those of us in EMEIA (Europe, Middle East, India, and Africa), and indeed around the world, this month is a reminder that cybersecurity…

CIS Level 1 vs Level 2: Complete Guide to Choosing the Right Security Framework
With cyber threats reaching unprecedented levels and data breaches affecting millions of organizations worldwide, implementing robust security frameworks has never been more critical. The Center for Internet Security (CIS) provides two distinct benchmark levels to help organizations protect their IT infrastructure; but which one is right for your business? This blog is a follow-up to…

V2L, V2G, and V2H: Your EV as a Power Station – Why Your Electric Car is More Than Just Transport
Picture this: You’re at home during a power outage, but while your neighbors are fumbling around with flashlights, you’re keeping your fridge humming and your devices charged – all thanks to your electric car. Sounds like science fiction? It’s actually happening right now, and I experienced it firsthand with my BYD Atto 3. When the…

Securing Your Apple Fleet: Why CIS Benchmarks Are Essential for Modern Organizations
In today’s rapidly evolving cybersecurity landscape, organizations need robust, proven security frameworks to protect their digital assets. For companies managing Apple device fleets, the Center for Internet Security (CIS) Benchmarks provides a comprehensive roadmap to enhance security posture while maintaining operational efficiency. What Are CIS Benchmarks? The CIS Benchmarks® are prescriptive configuration recommendations for more…









