Pen and notebook on a desk

adesso Blog

Methodology

NIS 2 can seem like an invincible giant in many ways to an organisation that must be compliant by 18/10/2024 and has not been regulated until now. Of course, the world of cyber threats continues to turn in parallel with the urgent implementation of the directive, and even seems to be heading inexorably towards us, and unfortunately, thanks to GenAI, ever faster. Microsoft offers a wide range of products that address the NIS 2 Principles. In this blog post, I explain what these are, what advantages they offer and what specifically needs to be done.

Read more
Industries

Customer identity and access management is used to control a user's digital access and manage their data. As a rule, the main focus here is on regulatory aspects. In my blog post, I would like to show you that it is also worthwhile for insurance companies to deal with this topic in terms of the user experience.

Read more

Save this page. Remove this page.