Related articles
The clock is ticking: stricter NIS2 guidelines from October 2024
The EU adopted the NIS2 Directive on cyber security in December 2022. The EU member states have until 17 [...]
Published on 23 Apr 2024 | by Markus Limacher | Data Governance | IT Security | 0 comments
The EU adopted the NIS2 Directive on cyber security in December 2022. The EU member states have until 17 [...]
Mobile stalkerware on the rise: how to keep your devices secure? [PART 1]
How well is your phone protected against malware and stalkerware? Given that half your life is stored in it, [...]
Published on 15 Apr 2024 | by Sandro Bachmann | CSIRT | 0 comments
How well is your phone protected against malware and stalkerware? Given that half your life is stored in it, [...]
Crypto agility puts IT Architecture in the Spotlight
Leaf Mound plc tackles crypto agility head on to bring its IT architecture up to speed for “Q-Day”. Find out [...]
Published on 09 Apr 2024 | by Markus Pfister | Architecture | 0 comments
Leaf Mound plc tackles crypto agility head on to bring its IT architecture up to speed for “Q-Day”. Find out [...]