TL;DR – In this blogpost, we will give you an introduction to the key requirements associated with the Risk Management Framework introduced by DORA (Digital Operational Resilience Act); More specifically, throughout this blogpost we will try to formulate an answer to following questions: What are the key requirements associated with the Risk Management Framework of DORA?What … Continue reading DORA and ICT Risk Management: how to self-assess your compliance
TL;DR – In this blogpost, we will give you an introduction to DORA, as well as how you can prepare yourself to be ready for it. More specifically, throughout this blogpost we will try to formulate an answer to following questions: What is DORA and what are the key requirements of DORA?What are the biggest challenges … Continue reading The digital operational resilience act (DORA): what you need to know about it, the requirements and challenges we see.
This blog post is the last part of a series, if you are interested in the security or privacy of smart home devices, be sure to check out the other parts as well! TL;DR: In our previous blog posts we concluded that there is quite a long way to go for both security and privacy … Continue reading Smart Home Devices: assets or liabilities? – Part 3: Looking at the future
The ISO 27001 Certification silver bullet An ISO 27001 certification is often used by a supplier to assure its customers they take information security seriously. This doesn’t mean that they will not suffer any security breaches but maintaining a well-designed ISMS will decrease the likelihood from happening. And that’s why many organizations rely on an … Continue reading Reviewing an ISO 27001 certificate: a checklist