The EU’s NIS2 Directive (Network and Information Security Directive) imposes significant requirements on the cybersecurity of critical and essential infrastructures. Companies subject to this directive must implement several measures to ensure the security of their networks and information. This Expert View describes the steps required to comply with NIS2 and provides some technical examples and recommendations.
SHARE :
This Excel document delivers market figures broken down by vertical sectors. Figures cover a seven-year time frame (results from the past two ...
Event Date : May 23, 2025
The Internet of Things vendor profiles portray leading providers in the Internet of Things area, analyzing their strategies and ...
Event Date : February 17, 2022
This Excel document positions and ranks the major software and IT services suppliers by revenue in Finland
Event Date : July 11, 2025
This short vendor profile provides a quick overview of the local portfolio and performance of Magyar Telekom in Hungary.
Event Date : June 05, 2025
Managing third-party exposure requires a holistic and technology-enabled approach that includes risk identification, assessment, mitigation, and ...
Event Date : December 19, 2024
Data & Application Security – Dependencies, Connections, and Provider Landscape - InBrief Analysis
Market Reports August 11, 2025
Datamart August 11, 2025
Datamart August 11, 2025
Vertical Sectors - Vendor Rankings - Spain
Datamart August 11, 2025
Software & IT Services - Vendor Rankings - Spain
Datamart August 11, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Part 3: Navigating the Cybersecurity Rulebook: A Business Guide to Key Regulations and Standards
Blog Post August 12, 2025
GenAI Search Is Disrupting Customer Engagement
Blog Post August 11, 2025
Swiss Manufacturing Faces U.S. Tariffs: Implications for the Swiss IT Industry
Blog Post August 08, 2025
Wired for Growth: Network Infrastructure as the Economy’s Nervous System
Blog Post August 05, 2025
Part 2: Decoding GRC: What Governance, Risk, and Compliance Mean in Cybersecurity
Blog Post August 05, 2025