Blogs
NIS2
CATEGORIES
Cegeka Applications Services
NIS2
August 06, 2025
Vendor risk management: Protect your business from third-party threats
In today’s hyper-connected, outsourcing-driven market, third-party vendors have become an extension of your organization. But without proper oversight, they...

Ludovica Gaspari
Cyber security & Networking
NIS2
March 10, 2025
Cyber resilience and NIS2-security compliance: assess for success
Many organizations no longer see cyber resilience as a luxury, but as an absolute necessity. This is also true for the European legislator. NIS2 requires...
/6.%20Other/afbeelding.jpg?width=56&height=56&name=afbeelding.jpg)
Remko Verdouw
Cegeka Applications Services
NIS2
December 23, 2024
Vendor Risk Assessment: A Strategic Business Pillar
In today’s increasingly complex and interconnected business landscape, managing supplier-related risks has never been more critical. With the introduction of...

Massimo Formati
Cyber security & Networking
NIS2
November 29, 2024
Detection & Response in Light of NIS2: 5 Key Observations
The new European cybersecurity directive, NIS2, has sparked considerable discussion and analysis. Security experts Stanley Kemkes and Willem Janssens from...

Willem Janssens
Cyber security & Networking
NIS2
November 29, 2024
Privileged Access Management: Boost Compliance and Strengthen Security
Privileged access is the ultimate prize for hackers, often at the core of security breaches. Due to this concerning trend, organizations are increasingly...

Ricardo Kowsoleea