Categoría: security & compliance

54% of European enterprises want long term open source support: how Ubuntu Pro + Support delivers

Europe’s open source ecosystem is at a turning point. The Linux Foundation’s Open Source as Europe’s Strategic Advantage: Trends, Barriers, and Priorities for the European Open Source Community amid Regulatory and Geopolitical Shifts report shows organizations across the continent are broadly adopting open source software (OSS). But adoption alone doesn’t guarantee resilience, innovation, or security. As […]

54% of European enterprises want long term open source support: how Ubuntu Pro + Support delivers

Europe’s open source ecosystem is at a turning point. The Linux Foundation’s Open Source as Europe’s Strategic Advantage: Trends, Barriers, and Priorities for the European Open Source Community amid Regulatory and Geopolitical Shifts report shows organizations across the continent are broadly adopting open source software (OSS). But adoption alone doesn’t guarantee resilience, innovation, or security. As […]

70% of IT teams spend more than 6 hours per week on security patching – new IDC research

Open source software is a popular tool for businesses for many reasons, but this adoption has introduced new challenges in maintaining their open source software supply chain. 57% of organizations source their packages from upstream open source repositories, and 51% from ecosystem packages like pip or npm. The research shows that while 9 out of 10 organizations would prefer to source packages from their OS, only 44% actually do. And half of businesses don’t automatically update their apps and Oses to the newest version.

A CISO’s comprehensive breakdown of the EU’s Cyber Resilience Act (EU CRA)

The CRA is coming, and you need to be prepared. Depending on the Class your product falls into, there could be additional assessment, security, documentation, patching, compliance and reporting requirements on you and your teams. Find out how your digital product or service is categorised, reexamine your cybersecurity practices and design standards, and take a hard look at your internal processes to figure out how you can advertise your software supply chain and product information – as well as report new vulnerabilities – in an effective and timely manner.

A comprehensive guide to NIS2 Compliance: Part 2 – Understanding NIS2 requirements

In my previous blog, we ran through what NIS2 is and who it applies to. In this second part of the series, I’ll break down the main requirements you’ll find in NIS2 and help translate them into actionable and practical measures you can take to achieve NIS2 compliance. Join me in this post and start understanding what NIS2 is all about.

A comprehensive guide to NIS2 Compliance: Part 1 – Understanding NIS2 and its scope

The EU NIS2 directive, which calls for strengthening cybersecurity across the European Union, is now active in all member states. Join me for this 3-part blog post series  in which I’ll explain what it is, help you understand if it is applicable to your company and how you can become NIS2 compliant. In this first […]