Cloud & Information Security So You Have Peace of Mind


Weak information security leads to data breaches. Especially when using cloud technology. BlueDragon Security strengthens your digital security and compliance, reducing risk so you can operate safely in this cloud era.


Discover Our ProcessLet's Talk

Subscribe to BlueDragon Insights

Insecure Cloud Configuration Is a Serious Risk

And can have severe consequences:

Data Leakage

Cloud removes the traditional security perimeter and, as a side effect, increases the risk of data leakage and exfiltration. Poor cloud configuration exposes your data to the world without you realizing it.


Standards like GDPR, PCI DSS, NIST, HIPAA, require controls to be put in place or limit access to sensitive data such as financial, medical, and PII data. Weak cloud configuration means weak controls resulting in non-compliance, which can lead to fines.

Increased Attack Surface

By its nature, the public cloud is accessible outside your on-premises perimeter and thus becomes a desirable target for attackers. Poor cloud configuration can become the stepping stone they need to access and take over your cloud workloads.

And that leads to sleepless nights and feeling anxious. We don’t want that for you. BlueDragon Security strengthens your cloud security and compliance, reducing risk so you can operate safely in the cloud.

Hi, I'm Jetro WILS

Founder of BlueDragon Security

I’m a Cloud & Information Security Advisor who began providing managed IT services as a teenager.

For 18 years, I’ve been active in various tech companies in Belgium. From developer to business analyst to product manager to cloud specialist, I’ve experienced digital evolution first-hand. I’ve seen the rise of cloud technology fundamentally change business operations, yet many organizations struggle to adopt cloud securely. Also, Europe adds more legislation yearly, making it harder to maintain compliance.

That’s why I founded BlueDragon Security: to help organizations operate safely in the cloud by strengthening their cloud security and compliance.

Interested? Let's start today.