Verder naar navigatie
Doorgaan naar hoofdinhoud
Ga naar de voettekst
Fox-IT Logo
Menu
Onze oplossingen
Open submenu voor Onze oplossingen
Assessment & Advisory
Assessment & Advisory
Risk Management
Supply Chain Risk
Cloud & Infrastructure
Application & Software
Mobile
Vulnerability Scanning
Hardware & Embedded Systems
Detection & Response
Detection & Response
Managed Detection & Response (MDR)
Incident Response
Threat Intelligence
Compliance
Compliance
Data Privacy
Overheid & regelgevingen
Betalingsbeveiliging
Academy
Academy
Awareness Programma's
Oefeningen & Demonstraties
Trainingen
Trainingsprogramma's
Escode
Escode
Software Escrow
SaaS Escrow
Escrow Agreements
Escrow Verification
Remediation
Remediation
Remediate
Bug Bounty
Uw sectoren
Open submenu voor Uw sectoren
Finance & Professional Services
Technologie, media en telecommunicatie
Transport en productie
Overheid
Retail
Energie- en nutsvoorzieningen
Trainingen
Over ons
Open submenu voor Over ons
Wie wij zijn
Duurzaamheid
Investeerdersrelaties
Vacatures
Resources
Resources
Resource Center
Tech Blog
Newsroom
Global Cyber Policy Radar
The state of supply chain security
Zoeken
NL
Open submenu voor regio's
Nederland
English
België
English
Client login
Open submenu voor Klantportalen
Managed Services Portal
Escrow View
Een zoekterm invoeren
​
Resource Hub
Toon of verberg filters
Filter op type
Resource type
Cyber Advice & Insights (1)
Article (36)
Case Studies (3)
Guides & Datasheets (3)
Whitepapers (2)
Onderwerp
Supply Chain Management (2)
Third-Party Risk Management (1)
Digital Forensics and Incident Response (DFIR) (1)
Regulations & Legislation (45)
Assessments (14)
Artificial Intelligence (1)
Technology (2)
General Consulting (4)
Computer security (1)
Consulting (2)
Data (1)
Telecom (1)
Politics (1)
APAC (1)
Sector
Energy & Utilities (2)
Financial Services (4)
Healthcare (4)
Public Sector & Government Services (7)
Retail & Consumer Markets (3)
Tech, Media & Telecoms (3)
Transport (1)
Legal & Professional Services (1)
Aviation & Aerospace (1)
Filters toepassen
Filters resetten
Case Studies
Case Study: Achieving TSA compliance for a UK mobile operator
door
Chris Proctor
20 Mar 2026
Article
NYDFS NYCRR Part 500: Our Guide to Cyber Security Compliance and Assessments
door
NCC Group
04 Mar 2026
Cyber Advice & Insights
A Practical Guide to GLBA Assessments for Financial Institutions
door
NCC Group
23 Feb 2026
Article
What Makes for a Good Cyber Security Policy Framework?
door
Alvaro Rosa
31 Oct 2025
Case Studies
Case Study: NIS2 Training for Board and Leadership teams at a Healthcare Organization
door
NCC Group
27 Oct 2025
Article
Why DORA is Still a Challenge for Financial Organisations
door
Paul Robinson
13 Oct 2025
Article
Understanding the Defence Cyber Certification (DCC) Scheme: What Suppliers Need to Know
22 Jul 2025
Article
Navigating the UK Cyber Security and Resilience Bill
door
Julian Brown
03 Jul 2025
Article
Digital Product Assurance and Cyber Security: Key Updates on EU, UK, and Global Regulations and Standards
26 May 2025
Article
The NIS2 Directive: Key Considerations & Practical Steps to Achieve NIS2 Compliance
door
Julian Brown
16 Apr 2025
Meer tonen