{"id":12903,"date":"2024-07-15T12:57:04","date_gmt":"2024-07-15T11:57:04","guid":{"rendered":"https:\/\/www.kappadata.pl\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/"},"modified":"2024-08-05T09:05:40","modified_gmt":"2024-08-05T08:05:40","slug":"whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements","status":"publish","type":"post","link":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/","title":{"rendered":"Whalebone: Your New Cybersecurity Guardian! Learn How It Exceeds NIS-2 Directive Requirements"},"content":{"rendered":"<p>WHALEBONE &#8211; a partner in meeting the requirements of the NIS-2 Directive<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article, we take a look at how Whalebone helps companies comply with the NIS-2 directive. Whalebone is a tool that not only complies with the NIS-2 directive, but also provides comprehensive protection against threats.<\/p>\n","protected":false},"author":26,"featured_media":12898,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[75,71,182],"tags":[],"class_list":["post-12903","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-publications","category-whalebone"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Monitoring and Reporting of Incidents - NIS-2 Directive<\/title>\n<meta name=\"description\" content=\"In this article, we take a look at how Whalebone helps companies comply with the NIS-2 directive. Whalebone is a tool that not only meets the requirements of the NIS-2 directive, but also provides comprehensive protection against modern cyber threats. Its advanced features, ease of integration and expert support make it an ideal choice for any organization seeking to enhance its network security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitoring and Reporting of Incidents - NIS-2 Directive\" \/>\n<meta property=\"og:description\" content=\"In this article, we take a look at how Whalebone helps companies comply with the NIS-2 directive. Whalebone is a tool that not only meets the requirements of the NIS-2 directive, but also provides comprehensive protection against modern cyber threats. Its advanced features, ease of integration and expert support make it an ideal choice for any organization seeking to enhance its network security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"Kappa Data\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-15T11:57:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-05T08:05:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kappadata.pl\/wp-content\/uploads\/2024\/07\/T350-15.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1228\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ola Serafin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ola Serafin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/\"},\"author\":{\"name\":\"Ola Serafin\",\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/#\\\/schema\\\/person\\\/d1b118980a9e892e9128e0dec942a300\"},\"headline\":\"Whalebone: Your New Cybersecurity Guardian! Learn How It Exceeds NIS-2 Directive Requirements\",\"datePublished\":\"2024-07-15T11:57:04+00:00\",\"dateModified\":\"2024-08-05T08:05:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/\"},\"wordCount\":24,\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.kappadata.pl\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/T350-15.jpg\",\"articleSection\":[\"News\",\"publications\",\"Whalebone\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/\",\"url\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/\",\"name\":\"Monitoring and Reporting of Incidents - NIS-2 Directive\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.kappadata.pl\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/T350-15.jpg\",\"datePublished\":\"2024-07-15T11:57:04+00:00\",\"dateModified\":\"2024-08-05T08:05:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/#\\\/schema\\\/person\\\/d1b118980a9e892e9128e0dec942a300\"},\"description\":\"In this article, we take a look at how Whalebone helps companies comply with the NIS-2 directive. Whalebone is a tool that not only meets the requirements of the NIS-2 directive, but also provides comprehensive protection against modern cyber threats. Its advanced features, ease of integration and expert support make it an ideal choice for any organization seeking to enhance its network security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.kappadata.pl\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/T350-15.jpg\",\"contentUrl\":\"https:\\\/\\\/www.kappadata.pl\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/T350-15.jpg\",\"width\":1920,\"height\":1228},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"publications\",\"item\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/category\\\/publications\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.kappadata.pl\\\/en\\\/category\\\/publications\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Whalebone: Your New Cybersecurity Guardian! Learn How It Exceeds NIS-2 Directive Requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/#website\",\"url\":\"https:\\\/\\\/www.kappadata.pl\\\/\",\"name\":\"Kappa Data\",\"description\":\"The Art of IT-infrastucture, security and IoT distribution\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.kappadata.pl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.kappadata.pl\\\/#\\\/schema\\\/person\\\/d1b118980a9e892e9128e0dec942a300\",\"name\":\"Ola Serafin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b33a839f63570fe8b8f59364eb7c69211298cafb1f9521405c3099f8cf7a09?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b33a839f63570fe8b8f59364eb7c69211298cafb1f9521405c3099f8cf7a09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b33a839f63570fe8b8f59364eb7c69211298cafb1f9521405c3099f8cf7a09?s=96&d=mm&r=g\",\"caption\":\"Ola Serafin\"},\"sameAs\":[\"http:\\\/\\\/kappadata.pl\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monitoring and Reporting of Incidents - NIS-2 Directive","description":"In this article, we take a look at how Whalebone helps companies comply with the NIS-2 directive. Whalebone is a tool that not only meets the requirements of the NIS-2 directive, but also provides comprehensive protection against modern cyber threats. Its advanced features, ease of integration and expert support make it an ideal choice for any organization seeking to enhance its network security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/","og_locale":"en_US","og_type":"article","og_title":"Monitoring and Reporting of Incidents - NIS-2 Directive","og_description":"In this article, we take a look at how Whalebone helps companies comply with the NIS-2 directive. Whalebone is a tool that not only meets the requirements of the NIS-2 directive, but also provides comprehensive protection against modern cyber threats. Its advanced features, ease of integration and expert support make it an ideal choice for any organization seeking to enhance its network security.","og_url":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/","og_site_name":"Kappa Data","article_published_time":"2024-07-15T11:57:04+00:00","article_modified_time":"2024-08-05T08:05:40+00:00","og_image":[{"width":1920,"height":1228,"url":"https:\/\/www.kappadata.pl\/wp-content\/uploads\/2024\/07\/T350-15.jpg","type":"image\/jpeg"}],"author":"Ola Serafin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ola Serafin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/#article","isPartOf":{"@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/"},"author":{"name":"Ola Serafin","@id":"https:\/\/www.kappadata.pl\/#\/schema\/person\/d1b118980a9e892e9128e0dec942a300"},"headline":"Whalebone: Your New Cybersecurity Guardian! Learn How It Exceeds NIS-2 Directive Requirements","datePublished":"2024-07-15T11:57:04+00:00","dateModified":"2024-08-05T08:05:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/"},"wordCount":24,"image":{"@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kappadata.pl\/wp-content\/uploads\/2024\/07\/T350-15.jpg","articleSection":["News","publications","Whalebone"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/","url":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/","name":"Monitoring and Reporting of Incidents - NIS-2 Directive","isPartOf":{"@id":"https:\/\/www.kappadata.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/#primaryimage"},"image":{"@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kappadata.pl\/wp-content\/uploads\/2024\/07\/T350-15.jpg","datePublished":"2024-07-15T11:57:04+00:00","dateModified":"2024-08-05T08:05:40+00:00","author":{"@id":"https:\/\/www.kappadata.pl\/#\/schema\/person\/d1b118980a9e892e9128e0dec942a300"},"description":"In this article, we take a look at how Whalebone helps companies comply with the NIS-2 directive. Whalebone is a tool that not only meets the requirements of the NIS-2 directive, but also provides comprehensive protection against modern cyber threats. Its advanced features, ease of integration and expert support make it an ideal choice for any organization seeking to enhance its network security.","breadcrumb":{"@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/#primaryimage","url":"https:\/\/www.kappadata.pl\/wp-content\/uploads\/2024\/07\/T350-15.jpg","contentUrl":"https:\/\/www.kappadata.pl\/wp-content\/uploads\/2024\/07\/T350-15.jpg","width":1920,"height":1228},{"@type":"BreadcrumbList","@id":"https:\/\/www.kappadata.pl\/en\/whalebone-your-new-cybersecurity-guardian-learn-how-it-exceeds-nis-2-directive-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.kappadata.pl\/en\/"},{"@type":"ListItem","position":2,"name":"publications","item":"https:\/\/www.kappadata.pl\/en\/category\/publications\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/www.kappadata.pl\/en\/category\/publications\/news\/"},{"@type":"ListItem","position":4,"name":"Whalebone: Your New Cybersecurity Guardian! Learn How It Exceeds NIS-2 Directive Requirements"}]},{"@type":"WebSite","@id":"https:\/\/www.kappadata.pl\/#website","url":"https:\/\/www.kappadata.pl\/","name":"Kappa Data","description":"The Art of IT-infrastucture, security and IoT distribution","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kappadata.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.kappadata.pl\/#\/schema\/person\/d1b118980a9e892e9128e0dec942a300","name":"Ola Serafin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/46b33a839f63570fe8b8f59364eb7c69211298cafb1f9521405c3099f8cf7a09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46b33a839f63570fe8b8f59364eb7c69211298cafb1f9521405c3099f8cf7a09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46b33a839f63570fe8b8f59364eb7c69211298cafb1f9521405c3099f8cf7a09?s=96&d=mm&r=g","caption":"Ola Serafin"},"sameAs":["http:\/\/kappadata.pl"]}]}},"_links":{"self":[{"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/posts\/12903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/comments?post=12903"}],"version-history":[{"count":1,"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/posts\/12903\/revisions"}],"predecessor-version":[{"id":12904,"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/posts\/12903\/revisions\/12904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/media\/12898"}],"wp:attachment":[{"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/media?parent=12903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/categories?post=12903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kappadata.pl\/en\/wp-json\/wp\/v2\/tags?post=12903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}