Search results
In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) is a crucial cornerstone for businesses, ensuring security, efficiency, and streamlined operations. But when investing huge sums of money in IAM programs, how to ensure the best possible return on investment?
Nixu Corporation, press release, June 6, 2024, at 08:00 a.m. EEST
As defined in Nixu's Turning Cybersecurity Challenges into Business Resilience whitepaper, business resilience is the ability of an organization to withstand and recover quickly from disruptions while at the same time maintaining business operations.
Critical infrastructure industries and numerous companies will soon be largely affected by the more stringent regulations of the NIS2 Directive introduced by the European Union.
Nixu Corporation
Press release, September 21, 2017 at 8:00 am EET
Nixu Corporation
Press release on 26.6.2017 at 14:15 EET
This the first part of our blog series "Things that security auditors will nag about and why you shouldn't ignore them". In these articles, Nixu's security consultants explain issues that often come up when assessing the security of web applications, platforms and other computer systems.
Two-factor authentication (2FA) is the security feature everyone knows. Any worthwhile security expert takes the opportunity to remind an organization or individual that they should enable two-factor authentication to their services.
The latest analyses of malware targeting automation systems, published in early June, are yet another reminder of the ability of such online threats to cause physical damage.
Nixu Corporation
Press release, November 9, 2015
Free for publication at 8:00 am.
Nixu Corporation
Press release December 16, 2015 at 8:00 EET
Story of Petya ransomware was starting to calm down already after making rounds during last week. Now, however, it seems that the story isn’t over yet. In the slipstream of Petya infections in Ukraine, a new ransomware dubbed FakeCry is now spreading.