The EU's New NIS2 Directive adoption On Thursday 28 October 2022, the EU Parliament’s committee on Industry, Research and Energy (ITRE) adopted the NIS-2 Directive with 70 votes in favour, 3 against and 1 abstention. The NIS2 Directive i...
Intelligent Security & Compliance questions for top management to check their exposure! Let's ask the right questions Managing cybersecurity and compliance can be done in many different ways, and all depends on the size and complexity of your company. There are many great cybersecurity f...
How to do asset identification & management How to identify and categorise your assets If you don't know exactly what you are trying to protect, where it lives and why it is important to the company, then you are probably doing it wrong. This i...
Vulnerability management Vulnerability Identification Similar to the quote "When you don't know what you're aiming at, you'll always miss", for security I like to say "You're least vulnerable when you know where you're most v...
Advance your career by becoming an independent information security consultant Cyber threats, including malware, phishing, and ransomware, are among the most severe threats to businesses today. For example, Google has found 100,000 malicious websites and 10,000 malicious files d...