The Yogosha blog

State-of-the-hack cybersecurity blog.

14/03/2025

Why CVEs and Automated Scanners Are Insufficient to Prioritize Your Security Operations

With the exponential growth in volume and sophistication of cyberattacks, further fueled by AI, organizations…
27/01/2025

DORA: Everything About Threat-Led Penetration Testing (TLPT)

Some entities regulated by DORA are required to carry out enhanced security tests, in the…
22/01/2025

DORA: The Challenge of Scaling Security Testing

Scaling security testing is a major challenge for DORA-regulated entities. Let's explore concrete solutions for…
NIS2 Illustration
18/12/2024

NIS2 Directive: Step-by-Step Guide to Compliance

Looking for an in-depth guide to NIS2 compliance? We've gone through the legislation and created…
10/12/2024

DORA and the Digital Operational Resilience Testing Program

Find out all there is to know about the digital operational resilience testing program, a…
15/11/2024

DORA: A Guide to Security Testing for Regulated Entities

Speed up your DORA compliance with this four-chapter guide to security testing requirements for entities…

Product News

Subscribe to our NEWSLETTER