Knowledge
February 16, 2026
In the evolving threat landscape of 2026, the terms compliance and resilience are often used interchangeably. However, they represent two distinct strategies for protecting organisational data. For leaders leveraging Microsoft 365, understanding this distinction is the difference between passing an audit and surviving a ransomware attack.
February 11, 2026
The Digital Operational Resilience Act (DORA), effective January 2025, imposes significant cybersecurity obligations on more than 21,000 EU financial institutions. It demands robust technical safeguards, rapid incident reporting (within four hours), structured risk management, and third-party oversight. This technical guide breaks down DORA’s compliance parameters and offers actionable implementation strategies for the 2025 deadline.
February 11, 2026
The European financial sector faces increasing cyber threats and operational disruptions. Consequently, the sector is now subject to the Digital Operational Resilience Act (DORA). This article, the second part of our essential guide, follows our initial overview of DORA in “Digital Operational Resilience Act: Essential Guide – Part 1”. We now delve into the specific technical cybersecurity requirements and controls mandated by DORA.
February 11, 2026
In the dynamic digital landscape of 2025, the drumbeat of cyberattacks continues to intensify, pushing regulatory bodies to fortify critical sectors. The European Union, recognising the existential threat posed to its financial stability, has introduced the Digital Operational Resilience Act (DORA).
February 11, 2026
In this dynamic environment, the NIS2 Directive stands as a pivotal piece of legislation, representing a significant stride forward in bolstering cybersecurity across the European Union.
February 6, 2026
The clock is ticking. For businesses operating across the European Union, a new era of digital security is not just coming—it’s here. Defined by two landmark legislative frameworks, the Digital Operational Resilience Act (DORA) and the NIS2 Directive, this era represents a fundamental, non-negotiable shift in how organisations manage digital infrastructure and protect data.
September 2, 2025
The regulatory landscape for cyber security is evolving at an unprecedented pace, placing significant pressure on mid-sized and large enterprise companies to not only meet but continuously maintain a high level of digital operational resilience. For organisations heavily reliant on Microsoft 365 environments, this presents a unique challenge.
December 19, 2024
One Tue 10th, December 2024 a notice was published by a Threat Actor ransomware group called Hunter International stating that Telecom Namibia Limited was allegedly hacked.
February 27, 2023
A Practical Guide to Attack Surface Management aims to provide practical tips and best practices to help organisations implement a comprehensive and effective attack surface management program. Attack Surface Management is a security practice aimed at identifying, managing, and mitigating potential attack vectors in an organisation’s IT environment.
January 25, 2023
A robust Supply Chain is the lifeblood of any successful business. However, this intricate web of suppliers, vendors and partners presents a significant vulnerability: security breaches. Recent high-profile attacks and alarming statistics underscore the urgent need for comprehensive Supply Chain Security management.
January 25, 2023
When a domain name is registered, ICANN requires that personal information including your full name, address, phone number, and email address be provided. This information is then made visible to the public via a WHOIS lookup.
January 10, 2023
The modern enterprise is a web of interconnected systems, and its security is only as strong as its weakest link. More often than not, that weakest link is a third-party vendor. Supply chain attacks, like the ones that have made headlines in recent years, have proven that a vendor’s security is a direct reflection of your own.
January 2, 2023
Before we dive into the “how-to,” let’s demystify these new regulations. They are all slightly different, but their core principles are remarkably similar.
The EU’s NIS2 Directive: Think “Proactive Cyber Health”
The first NIS Directive was a good start, but it only applied to a small number of critical industries. NIS2 is the big brother with a much wider reach.



















