Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NIS 2 compliance checklist: The ultimate 7-step approach for your organization

With NIS 2 becoming part of national laws, compliance has become mandatory for organizations within its scope. ‍ Although NIS 2 has addressed some of its predecessor’s shortcomings by expanding its scope and setting clearer security and reporting requirements, it remains demanding for security and compliance teams. Its prescriptive guidance and requirements are still limited in certain areas, which can leave teams uncertain about the exact steps to take.

Data Loss Prevention and NIS2: how to plug DLP security gaps for NIS2 compliance

Data loss prevention (DLP) solutions, which kick in after data is stored, are insufficient for NIS2 compliance. Here’s how to plug the DLP security gap before data is stored. Does traditional data loss prevention (DLP) software help or hinder NIS2 compliance?

Article 7 of GDPR: Preserving Data Integrity in Image Publication

For all the tremendous opportunities that the digitization of business operations has unlocked, there are also complex security and data privacy challenges that organizations have to navigate. In the interests of business privacy and security, legislation exists to hold organizations and policymakers to account. None are perhaps more influential and necessary than the EU’s General Data Protection Regulation (GDPR).

From NIS to NIS 2: How to navigate the updated directive

The Network and Information Security 2 (NIS 2) directive is a successor to the original NIS directive. Its purpose is to strengthen the cybersecurity posture of the businesses and organizations it covers across different sectors. ‍ NIS 2 expands on the original directive with notable changes and updates aimed at consolidating and strengthening cybersecurity practices in EU Member States.

What is NIS 2? A guide to navigating compliance requirements

The Network and Information Security (NIS) directive was introduced in 2016 to outline cybersecurity obligations across the EU and enable operational resilience for in-scope organizations. In 2020, the European Commission proposed the directive’s revision, which led to the formal adoption of NIS 2 in 2022. ‍ In this guide, we answer the common question of organizations impacted by the directive—What is NIS 2?

ISO 27001 and NIS 2: Key differences explained

ISO 27001 is a globally recognized standard for building robust information security management systems (ISMS). The standard is closely aligned with NIS 2—a mandatory EU directive designed to fortify the cybersecurity posture of critical infrastructure among Member States. ‍ These two frameworks form a unique symbiotic relationship due to the potential overlap in the requirements and controls.

DORA and NIS 2: Importance and key differences explained

The Digital Operational Resilience Act (DORA) and the Revised Network and Information Systems (NIS 2) are two of the latest EU cybersecurity regulations designed to fortify the security posture and cyber resilience of in-scope entities. ‍ Both regulations share the same general purpose of increasing their respective sectors' overall transparency and security. Still, their approaches to this goal vary in several key aspects you’ll learn about in this guide.

Who needs to comply with NIS 2? Scope, requirements, and penalties explained

NIS 2 is a new EU directive that establishes a unified cybersecurity framework for specific organizations within Member States. Compared to the original NIS directive, the scope has been expanded, and compliance is mandatory for in-scope organizations. ‍ The broader scope means that while NIS 2 is EU-specific, some organizations outside the Union may also be subject to its requirements.

The European Supply Chain Battlefield: Cybersecurity, National Defense, and the NIS2 Directive

In an increasingly interconnected digital world, supply chain security has become a critical concern for European organizations, policymakers, and national defense agencies alike. With adversaries exploiting software dependencies, contractors, and managed service providers (MSPs), the cybersecurity risks embedded within supply chains have never been more significant.

Japan Passes Active Cyber Defense Bill

Over the past few years, many countries have made considerable efforts to bolster cybersecurity preparedness. These efforts are understandable when put into a geopolitical context: global relationships in the past five years have been among the most tumultuous in decades, cybersecurity threats are more sophisticated than ever, and the world is increasingly reliant on digital technologies.