17 mins read
Secure communication today: a look at metadata, shadow IT, NIS 2 and DORA
Encryption protects content. But who protects everything else? Who communicates with whom, when and from where: this information is generated with every message. For emergency services, critical infrastructure operators and...