{"id":4710,"date":"2025-02-19T17:36:14","date_gmt":"2025-02-19T17:36:14","guid":{"rendered":"https:\/\/cyber-bee.it\/cyber-bee-and-cyberoo-new-remediation-techniques-and-nis2\/"},"modified":"2025-02-19T17:36:14","modified_gmt":"2025-02-19T17:36:14","slug":"cyber-bee-and-cyberoo-new-remediation-techniques-and-nis2","status":"publish","type":"post","link":"https:\/\/cyber-bee.it\/en\/cyber-bee-and-cyberoo-new-remediation-techniques-and-nis2\/","title":{"rendered":"Cyber-Bee and Cyberoo: New Remediation Techniques and NIS2"},"content":{"rendered":"<p>With 2025 just around the corner, which promises increasingly stringent regulations and a growing <strong>cyber insecurity<\/strong> landscape, companies cannot be satisfied with basic security solutions.<\/p>\n<p>During the event, experts from Cyber-Bee and Cyberoo explored cyber-related topics such as chain of rescue, MDR solutions and more with the goal of innovating business by protecting it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udcaa\ud83c\udffb How can companies combine NIS2 compliance with information security strategies?<\/p>\n","protected":false},"author":5,"featured_media":4629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[44,43],"tags":[45],"class_list":["post-4710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-en","category-company-en","tag-evidence2"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/posts\/4710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/comments?post=4710"}],"version-history":[{"count":0,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/posts\/4710\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/media\/4629"}],"wp:attachment":[{"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/media?parent=4710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/categories?post=4710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/tags?post=4710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}