European Cyber Resilience: How the EU Can Patch the Weak Spots in its Collective Armour

European Cyber Resilience: How the EU Can Patch the Weak Spots in its Collective Armour

In the thrust and parry of cyber resilience, the European Union (EU) has forged a legal framework made of many pieces to fortify its digital defences. Yet, there remain two clear weak spots in Europe’s collective armour: the presence of unsupported connected devices within critical infrastructure networks and the opacity surrounding the handling of newly discovered, or obtained, vulnerabilities by government agencies. In this blog, I delve into these two crucial issues for EU policymakers…

Read More

Rebooting Europe’s Sustainable Growth and Connectivity with Cisco’s Policy Roadmap

Rebooting Europe’s Sustainable Growth and Connectivity with Cisco’s Policy Roadmap

On Sunday, like 185 million of my fellow European citizens, I headed to my local polling station to vote in the European elections. As the banners come down, and the corks and confetti are swept up, the buzz of campaigning will now shift to practical policy making. When our elected MEPs (Members of the European Parliament) head to Strasbourg for their first session in July, over half of them will be newcomers. The beginning of…

Read More

The intersection of public health and security

The intersection of public health and security

The intersection of public health and security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Benchmarking is the missing link to cyber resilience

Benchmarking is the missing link to cyber resilience

Benchmarking is the missing link to cyber resilience | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

SAP cyber resilience is not a one-and-done procedure

SAP cyber resilience is not a one-and-done procedure

SAP cyber resilience is not a one-and-done procedure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Cybersecurity teams must proactively fight ransomware

Cybersecurity teams must proactively fight ransomware

Cybersecurity teams must proactively fight ransomware | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Bouncing back after a cyberattack: A cyber resilience checklist

Bouncing back after a cyberattack: A cyber resilience checklist

Bouncing back after a cyberattack: A cyber resilience checklist | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

5 steps to conducting a cyber resilience review

5 steps to conducting a cyber resilience review

5 steps to conducting a cyber resilience review | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The human element to cyber resiliency

The human element to cyber resiliency

<!– The human element to cyber resiliency | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

4 cybersecurity strategies for resilience in global crises

4 cybersecurity strategies for resilience in global crises

<!– 4 cybersecurity strategies for resilience in global crises | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2