
NIS2 Architecture Security: An Interactive Guide
In this section you can find a large selection of high-quality research papers, intelligence reports and whitepapers. Use the opportunity to learn about new threats and technologies, get updated on best practices and find actionable advice.
This is your number source for professional insights on key information about cyberdefense. It's never been more important to stay informed about the cybersecurity landscape.
This e-book highlights the importance of integrating Governance, Risk, and Compliance (GRC) into business and cybersecurity strategies.
Whilst commonly referred to as Ransomware, we define “Cyber Extortion” (Cy-X) as a form of computer crime in which the security of a digital asset (Confidentiality, Integrity, or Availability) is compromised and exploited in a threat of some form to extort payment.
Download the Cy-Xplorer report to learn more.
NIS2 Architecture Security: An Interactive Guide
Vigtige OT-sikkerhedsindsatsområder, som sikrer NIS2-compliance
NIS2 Requirements and OT Security
E-Book: Intelligence-led Managed Security Services
E-Book: Governance, Risk & Compliance The strong link between business and cybersecurity
E-Bog: Governance, Risk & Compliance - det stærke led mellem forretning og cybersikkerhed
Before the bubble bursts – Tackling the threat of a global security debt crisis
Detection & Response: Security is a team sport
eBook: Is your Cyberdefense strong enough?
OT & Ransomware