Knowledge

NIS2 Directive Readiness: Compliance, Challenges & Recommendations
May 1, 2026
In this dynamic environment, the NIS2 Directive stands as a pivotal piece of legislation, representing a significant stride forward in bolstering cybersecurity across the European Union.
The Digital Operational Resilience Act: Essential Guide – Part 2
April 23, 2026
The European financial sector faces increasing cyber threats and operational disruptions. Consequently, the sector is now subject to the Digital Operational Resilience Act (DORA). This article, the second part of our essential guide, follows our initial overview of DORA in “Digital Operational Resilience Act: Essential Guide – Part 1”. We now delve into the specific technical cybersecurity requirements and controls mandated by DORA.
Digital Operational Resilience Act: Essential Compliance Guide (Part 1)
March 20, 2026
The Digital Operational Resilience Act (DORA), effective January 2025, imposes significant cybersecurity obligations on more than 21,000 EU financial institutions. It demands robust technical safeguards, rapid incident reporting (within four hours), structured risk management, and third-party oversight. This technical guide breaks down DORA’s compliance parameters and offers actionable implementation strategies for the 2025 deadline.
A Practical Guide to Attack Surface Management
February 27, 2026
A Practical Guide to Attack Surface Management aims to provide practical tips and best practices to help organisations implement a comprehensive and effective attack surface management program. Attack Surface Management is a security practice aimed at identifying, managing, and mitigating potential attack vectors in an organisation’s IT environment.
February 16, 2026
In the evolving threat landscape of 2026, the terms compliance and resilience are often used interchangeably. However, they represent two distinct strategies for protecting organisational data. For leaders leveraging Microsoft 365, understanding this distinction is the difference between passing an audit and surviving a ransomware attack.