This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
The NIS2 directive creates new space to strengthen the level of cyber security across the EU. This updated version of the first directive on network and information secur... more...
is a form of malware that uses social engineering to induce fear or a perception of threat in order to manipulate a user into downloading or purchasing malicious software... more...
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... more...
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1