Category Blog

The NIS2: A New Era for Supply Chain Security

The weakest link in your supply chain can be a significant vulnerability. The recent introduction of the Network and Information Security (NIS2) Directive in the EU underscores this reality by mandating stricter cybersecurity measures across supply chains. At Edgewatch, we…

An In-Depth Look at the NIS2 Directive

The NIS2 Directive is a legislative framework established by the European Union to enhance the overall level of cybersecurity across member states. Building on the foundation laid by its predecessor, the NIS Directive (Directive on Security of Network and Information…

Compliance and Security in the Age of Data Breaches

The stakes for maintaining a robust cybersecurity posture have never been higher. Recent studies, including the 2023 Cost of a Data Breach Report by the Ponemon Institute and IBM Security, underscore a troubling trend: the average cost of a data…

Navigating C5 Compliance

Since 2016, the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, or BSI) has set a new benchmark in cloud security with the Cloud Computing Compliance Controls Catalog (C5). This audited standard isn’t just a bunch…

Tackling the Evolving Threat Landscape

Lucia Mundina, CEO of Edgewatch, Addresses Cybersecurity Exposure in the Age of AI Today, at the Accelerator Stagering°werk event held at Nürburgring, Germany, technology enthusiasts, cybersecurity experts, and industry leaders gathered to witness a thought-provoking keynote presentation by Lucia Mundina,…

JA3 Fingerprinting in Cybersecurity

In the relentless cat-and-mouse game of cybersecurity, staying one step ahead of malicious actors is an imperative. The advent of encrypted internet traffic, while a boon for data privacy, has also posed substantial challenges for cybersecurity experts. JA3 fingerprinting has…

OWASP API Security Top 10

APIs, or application programming interfaces, allow different platforms, apps, and systems to connect and share data with each other. They are used by IoT devices, mobile applications, traditional web applications, and almost every website that communicates directly with other applications.…