Tixeo Blog - Get informed to collaborate in complete cybersecurity

Transposition de NIS 2 en Europe : État des lieux par pays

NIS 2 Transposition in Europe: State of Play

The NIS 2 directive, or Network and Information Security 2, represents a major evolution in strengthening cybersecurity across the European Union....
NIS-2-Guide-2025

NIS 2 Guide – 2025: Strengthening Your Organization’s Cybersecurity

Why is the NIS 2 Directive crucial for cybersecurity? The NIS 2 Directive (Network and Information Security) came into effect on January 16, 2023,...
8 Key Steps to NIS 2 Compliance

8 Key Steps to NIS 2 Compliance

The NIS 2 Directive marks a significant advancement in cybersecurity and cyber-resilience in Europe. In the face of escalating cyber threats, it is...
What information is targeted by Industrial Espionage?

What information is targeted by Industrial Espionage?

Industrial espionage targets sensitive companies, in sectors like energy or technology, against a backdrop of geopolitical tensions and economic instability. Certain secret information of these organizations is particularly sought after. Industrial Espionage: the...

read more
Cyberspace: key geopolitical events in 2024

Cyberspace: key geopolitical events in 2024

The year 2024 will be marked by several significant political and geopolitical events that will have repercussions in cyberspace. What are they, and what are the cybersecurity risks? The 2024 political elections As the war in Ukraine and the Israeli-Palestinian...

read more
The Surveillance Industry or Europe’s Dangerous Paradox

The Surveillance Industry or Europe’s Dangerous Paradox

Excerpt from the Digital Violence platform (https://www.digitalviolence.or) Opinion piece by Jean-Philippe Commeignes, Commercial Director @Tixeo Europe, struck by the war in Ukraine for nearly two years, has been experiencing an intensification of the terrorist...

read more
Cybersecurity: What is a Security Certification?

Cybersecurity: What is a Security Certification?

Security certification for digital products and solutions is a hallmark of reliability. What does this certification entail, and how does it ensure a high level of cybersecurity? Definition of a Security Certification Security certification for computer solutions and...

read more
State Cyberespionage: Challenges and Key Figures (Infographic)

State Cyberespionage: Challenges and Key Figures (Infographic)

European businesses and organisations are facing an increase in state-originated cyberespionage attacks, predominantly from Russian or Chinese sources, which have escalated since the Ukrainian war. Key statistics of state cyberespionage include: In 2022, 77% of state...

read more
How to Assess the Credibility of a Security Certification?

How to Assess the Credibility of a Security Certification?

To prove their dependability, IT solutions may acquire a security certification. This becomes a significant advantage in the IT market, especially in an era where cybersecurity is a key concern for organizations. However, how can one ensure the credibility of a...

read more
“Bossware”: what is this software that spies on employees?

“Bossware”: what is this software that spies on employees?

Bossware makes it possible to monitor an employee's activity remotely. The use of spyware is more widespread than you might think, especially since the advent of teleworking and AI. How can they be detected and what are the risks?   What is bossware? Definition and...

read more

Follow Tixeo on social media: