The Cyber Resilience Act (CRA), which is currently being discussed in the EU, is not aimed at specific user companies, unlike new regulations such as NIS2 and DORA, but at suppliers (manufacturers, importers, distributors) of IT hardware and software. The CRA is expected to come into force in 2025, so the relevant providers do not have too much time to prepare. Now is the time to act even though the law is not in effect as yet.
SHARE :
This short vendor profile provides a quick overview of the local portfolio and performance of Soitron in Slovakia.
Event Date : May 05, 2022
This document provides market volumes, growth rates and forecasts for the Business Application Software (BAS)-related Consulting & Systems ...
Event Date : January 17, 2025
For many years, system integrators and consulting companies have played a significant role in assisting customers in implementing and transforming ...
Event Date : May 11, 2022
PAC has evaluated 28 providers of AWS-related services in Europe, France, and Germany.
Event Date : September 27, 2023
Rankings of the major IT security software vendors and the major IT security service providers in France, Germany, UK, US, EMEA & Worldwide.
Event Date : November 06, 2024
Data & Application Security – Dependencies, Connections, and Provider Landscape - InBrief Analysis
Market Reports August 11, 2025
Datamart August 11, 2025
Datamart August 11, 2025
Vertical Sectors - Vendor Rankings - Spain
Datamart August 11, 2025
Software & IT Services - Vendor Rankings - Spain
Datamart August 11, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Part 3: Navigating the Cybersecurity Rulebook: A Business Guide to Key Regulations and Standards
Blog Post August 12, 2025
GenAI Search Is Disrupting Customer Engagement
Blog Post August 11, 2025
Swiss Manufacturing Faces U.S. Tariffs: Implications for the Swiss IT Industry
Blog Post August 08, 2025
Wired for Growth: Network Infrastructure as the Economy’s Nervous System
Blog Post August 05, 2025
Part 2: Decoding GRC: What Governance, Risk, and Compliance Mean in Cybersecurity
Blog Post August 05, 2025