Resources


NIS 2 compliance
More than a decade ago, the European Union recognized the need to develop a common legal framework on cybersecurity that would lay the foundation for a shared strategy to fight cybercrime together. This need led to the creation of the NIS 1 Directive. However, as cyber threats evolved rapidly, it proved insufficient. In this document, we analyze the new NIS 2 Directive and the key aspects of the update.
Download NIS 2 compliance Document
Extended Cybersecurity
The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These relate to the scope of the strategy, the lack of involvement of the rest of the organisation and the insufficient corporate resources allocated to cyber security. In this paper we analyse these challenges and propose how to solve them using the corporate cyber security strategy itself based on innovative cyber security solutions.
Download Extended Cybersecurity Document
Cyber Threat Intelligence
Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition to defence and protection strategies, intelligence strategies to manage exposure to threats. In this paper we compare perimeter cybersecurity and extended cybersecurity strategies and analyse how AI is one of the determinants of success in the new cybersecurity paradigm: cyber threat intelligence.
Download Cyber Threat Intelligence Document
NIS 2 compliance
More than a decade ago, the European Union recognized the need to develop a common legal framework on cybersecurity that would lay the foundation for a shared strategy to fight cybercrime together. This need led to the creation of the NIS 1 Directive. However, as cyber threats evolved rapidly, it proved insufficient. In this document, we analyze the new NIS 2 Directive and the key aspects of the update.
Download NIS 2 compliance Document
Extended Cybersecurity
The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These relate to the scope of the strategy, the lack of involvement of the rest of the organisation and the insufficient corporate resources allocated to cyber security. In this paper we analyse these challenges and propose how to solve them using the corporate cyber security strategy itself based on innovative cyber security solutions.
Download Extended Cybersecurity Document
Cyber Threat Intelligence
Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition to defence and protection strategies, intelligence strategies to manage exposure to threats. In this paper we compare perimeter cybersecurity and extended cybersecurity strategies and analyse how AI is one of the determinants of success in the new cybersecurity paradigm: cyber threat intelligence.
Download Cyber Threat Intelligence Document

Downloadables by sector(Brouchers)
If you want to know how Digital Risk is a threat to the viability of the business that also affects all departments of the organisation and how it can be minimised thanks to XTI Cybersurveillance, we tell you about it in this document that we have written specifically for your sector.




