What you need to know about the EU's Digital Operational Resilience Act (DORA) What is DORA The Digital Operational Resilience Act (DORA) , is an initiative introduced by the European Parliament and the Council, set to become effective by 17 January 2025 . This regulation was co...
Efficiency in compliance management Introduction Compliance management is vital for organizations seeking to comply with the regulations and standards applicable to their operations. However, managing all of these standards and regulati...
The Importance of Investing in an Information Security Management System (ISMS) Introduction As the world becomes more and more reliant on technology, the risks of cybersecurity threats and vulnerabilities are on the rise. From large corporations to small businesses and even indi...
Building an effective security program Building an effective security program can be a daunting challenge for any size company. This is because you don't only need to think of technical measures, but also integrate this into your organizat...
The new EU Digital Services Act On Wednesday 16 November 2022, the new EU Digital Services Act (DSA) entered into force bringing a new set of EU rules for a safer and more accountable online environment. The Digital Services Act is ...
The EU's New NIS2 Directive adoption On Thursday 28 October 2022, the EU Parliament’s committee on Industry, Research and Energy (ITRE) adopted the NIS-2 Directive with 70 votes in favour, 3 against and 1 abstention. The NIS2 Directive i...
Intelligent Security & Compliance questions for top management to check their exposure! Let's ask the right questions Managing cybersecurity and compliance can be done in many different ways, and all depends on the size and complexity of your company. There are many great cybersecurity f...
How to do asset identification & management How to identify and categorise your assets If you don't know exactly what you are trying to protect, where it lives and why it is important to the company, then you are probably doing it wrong. This i...
Vulnerability management Vulnerability Identification Similar to the quote "When you don't know what you're aiming at, you'll always miss", for security I like to say "You're least vulnerable when you know where you're most v...
Advance your career by becoming an independent information security consultant Cyber threats, including malware, phishing, and ransomware, are among the most severe threats to businesses today. For example, Google has found 100,000 malicious websites and 10,000 malicious files d...