Phew! That was hard work. Just finished a 3-hour session where we tried to match the current state of our information security management system with the requirements of NIS2.
And that was just the beginning. Implementing the measures to close the gaps will definitely not be any easier!
October 14, 2025 at 2:09 PM
Phew! That was hard work. Just finished a 3-hour session where we tried to match the current state of our information security management system with the requirements of NIS2.
And that was just the beginning. Implementing the measures to close the gaps will definitely not be any easier!
What I don't understand, as a not-American but more as a human: ok, a Republican politician stands for his values and supports the republican president. That's ok. But as soon as I find out that this man is a criminal and a pedophile, my human conscience must kick in and I have to boycott this man.
October 12, 2025 at 10:10 PM
What I don't understand, as a not-American but more as a human: ok, a Republican politician stands for his values and supports the republican president. That's ok. But as soon as I find out that this man is a criminal and a pedophile, my human conscience must kick in and I have to boycott this man.
One of the biggest mistakes in security awareness: implementing measures without targeting a predefined risk. If you don’t know what you’re protecting against, your efforts might miss the mark. Risk first, action second, review third!
October 10, 2025 at 12:58 PM
One of the biggest mistakes in security awareness: implementing measures without targeting a predefined risk. If you don’t know what you’re protecting against, your efforts might miss the mark. Risk first, action second, review third!
Cybersecurity isn’t just about technology. Information security starts with the right mindset – especially in leadership. Every risk, even technical ones, originates from human decisions. True security demands investment in time, budget, and skilled people.
October 7, 2025 at 10:56 AM
Cybersecurity isn’t just about technology. Information security starts with the right mindset – especially in leadership. Every risk, even technical ones, originates from human decisions. True security demands investment in time, budget, and skilled people.