top of page
ree

Portugal has officially approved the European NIS2 directive, establishing a new level of cybersecurity requirements at national level. The directive reinforces obligations for public and private organizations across multiple sectors, expanding the number of entities covered and introducing stricter criteria for risk management and incident response.


Key changes include:


  • A broader range of entities now covered, classified as essential or important.

  • More robust technical and organizational security measures.

  • Strengthened incident reporting requirements.

  • Mandatory supply chain risk management.

  • Increased accountability for top management, with significant penalties for non-compliance.


CyberSafe is already supporting organizations in preparing for the new directive through maturity assessments, specialized consulting, managed security services, solution implementation, and team training.


The approval of NIS2 marks the moment to act.


Organizations should begin adapting as soon as possible to strengthen their digital resilience. Speak with our experts.

ree

Cybersafe, in partnership with Palo Alto Networks, is introducing Cortex XSIAM, an innovative platform that is redefining how organizations manage their security operations.


Designed to address the growing volume of alerts and the increasing complexity of security data, Cortex XSIAM brings together artificial intelligence, automation, and advanced data analytics in a single solution. The result is faster and more effective threat response, while significantly improving SOC operational efficiency.


More than a traditional SIEM, Cortex XSIAM consolidates multiple security components - including SIEM, SOAR, XDR, TIM, UEBA, and NTA/NDR - into an AI-powered, data-driven platform, transforming the SOC into an intelligent operations center.


With this partnership, Cybersafe reinforces its commitment to delivering next-generation cybersecurity solutions that help organizations protect themselves in an increasingly complex threat landscape.


Get in touch to discover how Cortex XSIAM can protect your business.

The transition to post-quantum cryptography represents one of the most significant security shifts of the decade.


ree

To address this challenge, OpenText has released Fortify SAST & DAST 25.4, introducing new capabilities that help organizations identify vulnerabilities and prepare for the impact of quantum computing.


Quantum Threat: A Real and Immediate Challenge

The algorithms that currently protect our digital information — RSA, DSA, and ECC — will become vulnerable under the power of quantum computers. The “harvest now, decrypt later” risk is already in motion: sensitive data can be collected today and decrypted in the future, compromising intellectual property, contracts, financial transactions, and strategic information.


ree

The Global Movement

Progress in this field is both rapid and inevitable:

  • The NIST (USA) published the official post-quantum cryptography standards (FIPS 203, 204, and 205) in 2024.

  • Over 47% of HTTPS traffic already uses hybrid post-quantum protocols.

  • Platforms such as Java 24 and .NET 10 have introduced native support.

  • Governments have set mandatory targets by 2030 for critical sectors.


OpenText Fortify SAST & DAST 25.4: Innovation for a Secure Future


The latest version of Fortify enables security and development teams to anticipate quantum impact:

  • SAST 25.4 automatically detects quantum-vulnerable algorithms (RSA, DSA).

  • DAST 25.4 identifies servers lacking post-quantum hybrid TLS 1.3 support, including X25519MLKEM768.

  • Flexibility: findings can be presented as Informational or with severity levels adjusted to the organization’s maturity.


Strategic Value for Management

  • Creation of a comprehensive inventory of cryptography in use.

  • Robust validation of critical communications.

  • Regulatory readiness and preparation for future audits.

  • Strengthening of digital resilience and market trust.


Cybersafe supports organizations in their transition to a post-quantum future, combining technical expertise, innovation, and industry-leading cybersecurity solutions.



Contact us to learn how to strengthen your organization’s security and digital resilience.

bottom of page