Cyber Threats in 2026: How Companies Can Defend Against AI Attacks and Supply Chain Risks The digital threat landscape...
Cyber Threats in 2026: How Companies Can Defend Against AI Attacks and Supply Chain Risks The digital threat landscape...
Meeting NIS-2 Directives with ISO 27001 – How Companies Should Now Take a Strategic Approach The EU's new NIS-2...
Establishing a Data-Driven Corporate Culture - Approaches and Challenges In today's business world, it's no longer...
Data protection impact assessment (DPIA) - when and how it should be carried out The introduction of the General Data Protection Regulation (GDPR) has fundamentally changed the legal framework for companies when handling personal data. One of the key changes is the...
Basic Principles of the Zero Trust model Zero Trust is based on several key principles: Explicit verification Each access is checked on the basis of several criteria: Identity, device status, location, time of day, role profile, etc. Access is only granted if all...
Obligations for companies under the AI Regulation plus checklist Introduction The European Union's AI Regulation (AI Act) represents a landmark step towards establishing a comprehensive legal framework for artificial intelligence. Designed to ensure that AI...
Humans as a Weak Point in Cybersecurity Cybersecurity plays a crucial role in an increasingly digitalized world. Companies, governments and private individuals are investing billions in technologies to protect their networks, data and systems. But despite the most...
The European Union's NIS2 Directive ("The Network and Information Security (NIS) Directive") marks a significant change in the area of cybersecurity. It extends the scope of the original NIS Directive from 2016 and will be implemented throughout the EU from October...
The NIS2 Implementation Act requires companies to strengthen their cyber security measures and to effectively manage risk.
Discover how ISO 27001 helps companies to manage security risks and protect data effectively.
NIS2 obliges companies to improve IT security measures and strengthens risk management against growing threats.
You need to load content from reCAPTCHA to submit the form. Please note that doing so will share data with third-party providers.
More Information