Cybersecurity

Cybersecurity

Houston, We Have an Immutable Rotten Backup

By Danny Zeegers with Jessica Eisenberg (N2W) & Caroline Verellen (IBM Storage) The Hidden Danger in “Immutable” One of the most celebrated concepts in modern cyber resilience under NIS2, DORA, and OT security frameworks is the immutable backup. Together with Jessica Eisenberg LINK , backup expert from N2WS, and Caroline Verellen, IBM storage strategist, we

Read More »
Cybersecurity

3 Days Total Blackout and Communication Loss: A Crisis Test as Step Up to NIS2 Level 3 Readiness

Why a Level 3 Crisis Plan Is Critical for NIS2 Essential Entities NIS2 essential entities—such as cloud providers, energy operators, or digital infrastructure firms or ICT business critical service providers—are on the front lines of Europe’s cyber resilience. Without a mature, Level 3 crisis management plan, these organizations risk catastrophic disruption in the face of

Read More »
Cybersecurity

Are all your business critical processes Trump and Musk proof?

Qfirst Risk Assessment Report: Evaluating the Risk of the USA Ceasing Services with EU Countries A Short Warning Story – Deepfake ? You can tell us within 3 years In 2028, EuroSecureTech, a fast-growing cybersecurity firm in Belgium, had built its business on a foundation of American cloud services, payment gateways, and AI-powered tools. They

Read More »
Cybersecurity

Moet een KMO tevreden zijn met 65 procent hackweerbaarheid

Het artikel “SecureSME” van ENISA richt zich op het verbeteren van de cyberbeveiliging binnen kleine en middelgrote ondernemingen (KMO’s) in de Europese Unie. ENISA stelt dat effectieve cyberbeveiliging voor KMO’s niet per se duur of complex hoeft te zijn; er zijn betaalbare en eenvoudig te implementeren maatregelen beschikbaar die de digitale veiligheid aanzienlijk kunnen versterken.  Ondersteunende

Read More »
Cybersecurity

Secrets to Success: Building Cyber Resilience in a NIS2 Essential Company

Your company is racing to meet NIS2 compliance. The CISO’s juggling threats, the compliance officer’s swimming in policies, and someone just handed you their task because “they thought you’d handle it better.” Congratulations—you’ve got yourself a monkey! 🐵 Building cyber resilience isn’t about passing the monkey or overcomplicating things. It’s about rolling up your sleeves, setting realistic goals,

Read More »

Blijf up to date met NIS2.news

Schrijf je in voor de nis2.news nieuwsbrief en mis nooit het laaste nieuws over NIS2