Modern identity management in the context of cyber security

eAuditor IAM: Modern identity management in the context of cyber security Effective data protection and [...]

NIS2 #6: Remote Installation

NIS2 #6: Remote Installation Remote software installation in accordance with NIS2 guidelines Ask for a [...]

NIS2 #5: Control of used applications and PROCESS policy

NIS2 #5: Control of used applications and PROCESS policy NIS2 application control and PROCESS policy [...]

NIS2 #4: DLP Policies.

NIS2 #4: DLP Policies. Management of DLP policies in accordance with NIS requirements Ask for [...]

NIS2 #3: Control of applications in use

NIS2 #3: Control of applications in use Effective application control in accordance with NIS2 Ask [...]

NIS2 #2: Blocking websites

NIS2 #2: Blocking websites Find out how to meet the most important requirements in a [...]

Whistleblower vs informer

Whistleblower vs informer The difference that matters Table of contents [...]