How to Comply with MiCA and DORA: A Detailed Guide for Executives

MiCA (Markets in Crypto-Assets Regulation) is a new set of rules from the European Union that is supposed make the crypto market safer and more reliable. It’s designed to protect people who invest in cryptocurrencies and that the crypto companies follow the rules. MiCA applies to anyone issuing or trading cryptocurrencies, like exchanges and wallet […]

How to Build a Cybersecurity Program for a Small Business

Small businesses have one priority: grow! However, focusing only on growth could lead to overlooking the critical importance of cybersecurity in their daily operations. Even when their B2B clients point out the lack of security, the sheer complexity of building and managing a robust cybersecurity program can feel overwhelming, leaving business owners uncertain about where […]

Making sense of all the penetration testing types

pentest types

Do you need to find out which type of penetration testing your company needs? Do you even need a penetration test, and if so, which kind? You’ve come to the right place. I have helped nuclear power plants defend themselves, banks, SaaS companies, fintechs, medtech companies, etc. So, I’ve got first-hand experience with most pent […]

ciber security or cybersecurity?

ciber security

Are you trying to find the correct spelling of ‘ciber security‘? It might be surprising, but there are regions, where the word ‘ciber’ is the correct spelling, but… not in the English language. Mostly in Spanish-speaking regions, but we’ll cover that later in the article.  The term’s most common and accepted spelling in English is […]

How to secure a digital wallet: A Comprehensive Guide

digital wallet security advice

Your digital wallet platform is supposed to improve your customers’ lives, and securing it would mean a great deal to them (and to you).  Development schedules and timelines rarely allow for enough security and tech teams rarely have the expertise or experience in fending off complex and targeted cyber attacks. This article is supposed to […]

Best Cybersecurity Audit Companies

cybersecurity companies ranking

Businesses have big liabilities when it comes to cyberattacks: In 2023, compromised business emails alone cost enterprises around $2.9 billion. That means business leaders have to think about having a good security posture. It’s not a nice-to-have… it’s a must-have. But what about ensuring a cybersecurity consulting firm has the right approach to evaluating systems, […]

List of DORA security requirements

list dora security requirements

Here is a list of all DORA security requirements for your organization. You can print it out and start working on them, before it is too late! And if you need expert help, just reach out and schedule a free consultation! 1. ICT Risk Management Framework Establish and maintain a comprehensive ICT risk management framework. […]

A Part-Time CISO Can Help Boost Cybersecurity Outcomes

parttimeciso

Companies today have a big problem. There are all sorts of challenges and pain points in the modern digital business related to resource allocation and planning, but one that’s pretty high on the list is cybersecurity. Let’s face it: businesses are vulnerable to a lot of different threat vectors. Cyberattacks are proliferating, and more complex […]

Temporary CISO: Weighing the Pros and Cons

temporary virtual ciso

In 2023, the average data breach cost hit $4.45 million. That’s a staggering number, and it’s rising every year. But here’s the kicker: most companies still don’t have a dedicated Chief Information Security Officer (CISO). Why? Budget constraints, talent shortages, or just not knowing where to start. That’s where a temporary CISO comes in. No […]