Tixeo Blog - Get informed to collaborate in complete cybersecurity

fin de skype for business server

End of Skype for Business Server: rethink your communications strategy

Microsoft is set to end extended support for Skype for Business Server (2015 and 2019) on 14 October 2025. From that point onwards, organisations...
Transposition de NIS 2 en Europe : État des lieux par pays

NIS 2 Transposition in Europe: State of Play

The NIS 2 directive, or Network and Information Security 2, represents a major evolution in strengthening cybersecurity across the European Union....
NIS-2-Guide-2025

NIS 2 Guide – 2025: Strengthening Your Organization’s Cybersecurity

Why is the NIS 2 Directive crucial for cybersecurity? The NIS 2 Directive (Network and Information Security) came into effect on January 16, 2023,...
What is an out-of-band communication?

What is an out-of-band communication?

Used in critical contexts, out-of-band communications contribute to protecting exchanges and ensuring the continuity of business activities for organisations in crisis situations. Definition An out-of-band communication refers to communications made outside of the...

read more
What information is targeted by Industrial Espionage?

What information is targeted by Industrial Espionage?

Industrial espionage targets sensitive companies, in sectors like energy or technology, against a backdrop of geopolitical tensions and economic instability. Certain secret information of these organizations is particularly sought after. Industrial Espionage: the...

read more
Cyberspace: key geopolitical events in 2024

Cyberspace: key geopolitical events in 2024

The year 2024 will be marked by several significant political and geopolitical events that will have repercussions in cyberspace. What are they, and what are the cybersecurity risks? The 2024 political elections As the war in Ukraine and the Israeli-Palestinian...

read more
The Surveillance Industry or Europe’s Dangerous Paradox

The Surveillance Industry or Europe’s Dangerous Paradox

Excerpt from the Digital Violence platform (https://www.digitalviolence.or) Opinion piece by Jean-Philippe Commeignes, Commercial Director @Tixeo Europe, struck by the war in Ukraine for nearly two years, has been experiencing an intensification of the terrorist...

read more
Cybersecurity: What is a Security Certification?

Cybersecurity: What is a Security Certification?

Security certification for digital products and solutions is a hallmark of reliability. What does this certification entail, and how does it ensure a high level of cybersecurity? Definition of a Security Certification Security certification for computer solutions and...

read more
State Cyberespionage: Challenges and Key Figures (Infographic)

State Cyberespionage: Challenges and Key Figures (Infographic)

European businesses and organisations are facing an increase in state-originated cyberespionage attacks, predominantly from Russian or Chinese sources, which have escalated since the Ukrainian war. Key statistics of state cyberespionage include: In 2022, 77% of state...

read more
How to Assess the Credibility of a Security Certification?

How to Assess the Credibility of a Security Certification?

To prove their dependability, IT solutions may acquire a security certification. This becomes a significant advantage in the IT market, especially in an era where cybersecurity is a key concern for organizations. However, how can one ensure the credibility of a...

read more

Follow Tixeo on social media: