How Do You Develop NIS 2-Compliant Software?
The NIS 2 Directive redefines the European framework for cybersecurity in essential services. Compar...
The NIS 2 Directive redefines the European framework for cybersecurity in essential services. Compar...
The NIS 2 Directive redefines the European framework for cybersecurity in essential services. Compar...
In recent years, the way we work has undergone significant changes. Companies have adopted hybrid an...
Expressions like digital sovereignty, sovereign cloud, and cloud sovereignty have now become part of...
Companies today recognize that their competitiveness depends on their ability to analyze and leverag...
On one thing, experts agree: when it comes to AI-based agents, we’ve only seen the tip of the iceber...
In Italy, cyberattacks increased by 15% in the past year (Clusit). The attack surface has grown expo...
In the past decade, supply chain security has become a top priority for many organizations. What, un...
Business success increasingly relies on digital tools, whose performance must always be guaranteed a...
In recent years, the race toward artificial intelligence has reshaped the technological priorities o...
By Roberto Marzocca, Head of Cybersecurity Kirey
kirey@pec.it
PI/CF: 06729880960
REA: MI 1910802
Tel: +39 02 78625200
Certifications

Data made human
info@kireygroup.com
Viale Francesco Restelli, 5
20124 Milano
Capitale sociale 1.089.620,00
© Copyright 2025 by Kirey