Experience from GAP Assessment Audits for NIS2 Compliance
The NIS2 (Directive (EU) 2022/2555 of the European Parliament and of the Council) imposes cybersecurity and information security compliance obligations…
The NIS2 (Directive (EU) 2022/2555 of the European Parliament and of the Council) imposes cybersecurity and information security compliance obligations…
President Donald Trump's new Secretary of State Marco Rubio announced that a U.S. citizen imprisoned in Belarus under Joe Biden…
In the dynamic landscape of Operational Technology (OT), robust cybersecurity measures are paramount. As the digital transformation accelerates, protecting critical…
Security a Top Concern During 2024 Election ‘Super-Cyle’ With an unprecedented ‘super-cycle’ of elections in 2024, almost half the world’s…
Hacktivists are conducting DDoS attacks on European political parties that represent and promote strategies opposing their interests, according to a…
By Srinivasan CR, Executive Vice President-Cloud and Cybersecurity Services & Chief Digital Officer, Tata Communications In a hyperconnected world, cyberattacks…
More than five years after domain name registrars started redacting personal data from all public domain registration records, the non-profit…
Caucasian theatergoers have been asked to refrain from attending a London play in July to ensure that the audience is…
Techniques used in cyber warfare can be sold to anyone — irrespective of borders, authorities, or affiliations. We need to…
By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis…