Featured

Cybersecurity

EU DATA ACT – Start 12 09 2025 CEO is uw bedrijf klaar

Lancering van de EU Data Act Series Danny Zeegers en Harry Van Der Plas slaan de handen ineen om een nieuwe EU Data Act-serie te lanceren, die bedrijven niet alleen helpt de regelgeving te begrijpen, maar ook effectief te implementeren. In dit eerste artikel geven we besturen en leidinggevenden een kritisch overzicht van de impact

Read More »
Featured

SALTY 2FA – ZERO trust MFA for NIS2 please

The Invoice That Wasn’t It was a normal Monday morning. Sarah, who works in finance, opened her inbox and saw an email from one of the company’s regular suppliers. The subject line: “Outstanding Invoice – Please Review”. It looked genuine. The logo was there, the tone was professional, and the sender’s name matched someone she

Read More »
Featured

Europese Commissie en het Simplification Omnibus IV-pakket

Stel je voor: Data2Secure BV, een groeiend IT-bedrijf uit Gent met 320 medewerkers. Ze specialiseren zich in cybersecuritydiensten voor internationale kmo’s en staan bekend om hun innovatieve aanpak. Tot voor kort moest DataSecure, zodra ze de grens van 250 werknemers overschreden, voldoen aan zware administratieve verplichtingen onder de GDPR: uitgebreide registers van verwerkingsactiviteiten, uitgebreide documentatie

Read More »
Cybersecurity

Winning Beyond the Walls: How NIS2 Leaders Outlearn Their Competition

If you only know the internal readiness concerning compliance and new digital technologies, you might win a few customer deals. If you don’t grasp the competitor side—and how compliance can add value—you’ll lose to those who do. NIS2 separates signal from noise. The organizations that win aren’t those who shout the loudest about the current

Read More »
Cybersecurity

How a UK Telecom hack helps Building NIS2 Resilience Against Microsoft Zero-Day Tsunamis

By Dean Blackquill – Writing from the fault lines of Europe’s cyber resilience The Challenge: Zero-Days as a Systemic Shock Zero-day exploits against Microsoft SharePoint on-premise continue to demonstrate how attackers can compromise critical infrastructure without ever knowing a username or password. By abusing software flaws directly, attackers bypass traditional login protections and gain system-level

Read More »
Cybersecurity

Honey, Our Bank Account Is Empty — MFA Cheated on Us

The Wake-Up Call It was just another Monday morning until the CFO shouted:“Honey, our bank account is empty!” The systems all looked green. Password policies ✔. Encryption ✔. Multi-Factor Authentication ✔.Every compliance dashboard had the comforting checkbox: MFA enabled. But in reality, attackers had already hijacked sessions and bypassed the second factor entirely. The so-called

Read More »

Blijf up to date met NIS2.news

Schrijf je in voor de nis2.news nieuwsbrief en mis nooit het laaste nieuws over NIS2