Cyber Resilience Act (CRA): Step-By-Step Guide to Compliance Need a compliance guide for the Cyber Resilience Act (CRA)? Here's a 15-step roadmap to…Sébastien Palais21/12/2024
NIS2 Directive: Step-by-Step Guide to Compliance Looking for an in-depth guide to NIS2 compliance? We've gone through the legislation and created…Sébastien Palais18/12/2024
DORA and the Digital Operational Resilience Testing Program Find out all there is to know about the digital operational resilience testing program, a…Sébastien Palais10/12/2024
DORA: A Guide to Security Testing for Regulated Entities Speed up your DORA compliance with this four-chapter guide to security testing requirements for entities…Sébastien Palais15/11/2024
DORA: A Complete Guide to Compliance for the Financial Sector Looking for a practical guide to DORA compliance? Here's a 17-point checklist to get you…Sébastien Palais12/10/2024
NIS2 vs DORA: what differences and which legislation prevails? DORA and NIS2 are two major pieces of European cybersecurity legislation. Find out which one…Sébastien Palais11/08/2024
Interviews Mazars: “We Need to Go Further Than Traditional Pentesting” How do you bring cybersecurity into the accounting profession? Christophe Ballihaut is in charge of…Sébastien Palais07/03/2024
Bug Hunters: 4 Paths to Join the Yogosha Strike Force Security researchers can now join the Yogosha Strike Force (YSF) via four selection paths: skills,…Yogosha02/02/2024
DORA: The Success of TLPTs, a Question of ROI for CISOs Threat-Led Penetration Testing (TLPT) costs DORA-regulated entities time and money. Let's take a look at…Sébastien Palais18/12/2023
Integration Testing: Checking That an App Is Working Properly In this article, you'll learn what integration testing is, and how to integrate it into…Florian Seigle-Vatte07/12/2023