In IT security, the question of when a system is considered “compromised” is less a technical issue and more a decision based on a risk assessment. This requires careful consideration and the most accurate possible determination of the actual initial situation and therefore goes far beyond simply reading off KPIs. What needs to be done? […]
Kategorie: cybersecurity
NIS-2: TeleTrusT vs. IT Planning Council
The NIS-2 Directive of the European Union will significantly increase the overall level of cybersecurity in the EU. The directive envisages an expansion of cybersecurity regulations to new sectors and institutions, aiming to improve the resilience and response capabilities of public and private entities, authorities, and ultimately the EU as a whole (https://digital-strategy.ec.europa.eu/). The IT […]