Section 1260H regulations create new risks for critical infrastructure. Learn how to ensure supply chain transparency in your mission-critical connectivity devices.| Semtech (formerly Sierra Wireless)
Unlock the potential of ZTNA for your organization. Fast-track the integration process and enjoy improved security and productivity.| Open Systems
See how Splashtop aligns with DORA, NIS2, ENS, TISA, and CRA to help organizations meet cybersecurity and operational resilience goals.| www.splashtop.com
Discover what the NIS2 Directive means for businesses in 2025. Learn about the latest updates in cybersecurity regulations, compliance requirements, and audit expectations under the EU's revamped framework.Ask ChatGPT| Big Data Analytics News
ENISA is the EU agency dedicated to enhancing cybersecurity in Europe. They offer guidance, tools, and resources to safeguard citizens and businesses from cyber threats.| www.enisa.europa.eu
The EU Commission unveiled the first step in its security strategy to ensure "lawful and effective" law enforcement access to data| TechRadar
On 26 May 2025, 89 civil society organizations, companies, and cybersecurity experts, including Global Encryption Coalition members, published a joint letter to the European Commission, calling on them to address concerns around the impact that the European Internal Security Strategy (Protect EU) would have on end-to-end encryption. The Internal Security Strategy’s focus on encryption will harm […]| Global Encryption Coalition
Learn how SafeSend helps organizations comply with NIS2 by reducing human error in email communication and preventing accidental data leaks.| SafeSend
Can we, are we legally allowed to and… should we?| QuestionAble by Pejgan
Get ready for the NIS2 deadline with our comprehensive guide. Learn how to ensure compliance and make preparation easier.| Hyperproof
Learn about a new, targeted backdoor supply chain attack against the popular XZ compression utility seen in many Linux distributions such as fedora and debian. Understand its impact, potential risks and what you can do about it.| www.sonatype.com
Network and Information Security2, nome in codice NIS2, è la direttiva europea che l’obiettivo di rafforzare la sicurezza informatica, e salvaguardare le infrastrutture critiche in Europa e nei singoli Stati membri| Cyber Guru
Find out about the impacts, obligations and consequences of the NIS2 directive. And discover how to prepare now.| Rudder
This post is dedicated to the memory of Niklaus Wirth, a computing pioneer who passed away January 1st. In 1995 he wrote an influential article called “A Plea for Lean Software”, and in what follows, I try to make the same case nearly 30 years later, updated for today’s computing horrors. The really short version: the way we build/ship software these days is mostly ridiculous, leading to 350MB packages that draw graphs, and simple products importing 1600 dependencies of unknown provenance.| Bert Hubert's writings
The Cyber Resilience Act enhances cybersecurity standards of products that contain a digital component, requiring manufacturers and retailers to ensure cybersecurity throughout the lifecycle of their products.| Shaping Europe’s digital future