How to Comply with MiCA and DORA: A Detailed Guide for Executives
MiCA (Markets in Crypto-Assets Regulation) is a new set of rules from the European Union that is supposed make the crypto market safer and more reliable. It’s designed to protect people who invest in cryptocurrencies and that the crypto companies follow the rules. MiCA applies to anyone issuing or trading cryptocurrencies, like exchanges and wallet […]
How to Build a Cybersecurity Program for a Small Business
Small businesses have one priority: grow! However, focusing only on growth could lead to overlooking the critical importance of cybersecurity in their daily operations. Even when their B2B clients point out the lack of security, the sheer complexity of building and managing a robust cybersecurity program can feel overwhelming, leaving business owners uncertain about where […]
Making sense of all the penetration testing types
Do you need to find out which type of penetration testing your company needs? Do you even need a penetration test, and if so, which kind? You’ve come to the right place. I have helped nuclear power plants defend themselves, banks, SaaS companies, fintechs, medtech companies, etc. So, I’ve got first-hand experience with most pent […]
ciber security or cybersecurity?
Are you trying to find the correct spelling of ‘ciber security‘? It might be surprising, but there are regions, where the word ‘ciber’ is the correct spelling, but… not in the English language. Mostly in Spanish-speaking regions, but we’ll cover that later in the article. The term’s most common and accepted spelling in English is […]
How to secure a digital wallet: A Comprehensive Guide
Your digital wallet platform is supposed to improve your customers’ lives, and securing it would mean a great deal to them (and to you). Development schedules and timelines rarely allow for enough security and tech teams rarely have the expertise or experience in fending off complex and targeted cyber attacks. This article is supposed to […]
NY DFS Requirements for CISO Coverage: Why a Virtual CISO Could Be the Best Solution for Compliance
Are you searching for a solution in hiring a CISO after a NY DFS audit or before you are audited? The Department of Financial Services of the State of New York has published new requirements, including having an appointed CISO for your company. In 2023, the New York Department of Financial Services (NY DFS) introduced […]
Best Cybersecurity Audit Companies
Businesses have big liabilities when it comes to cyberattacks: In 2023, compromised business emails alone cost enterprises around $2.9 billion. That means business leaders have to think about having a good security posture. It’s not a nice-to-have… it’s a must-have. But what about ensuring a cybersecurity consulting firm has the right approach to evaluating systems, […]
List of DORA security requirements
Here is a list of all DORA security requirements for your organization. You can print it out and start working on them, before it is too late! And if you need expert help, just reach out and schedule a free consultation! 1. ICT Risk Management Framework Establish and maintain a comprehensive ICT risk management framework. […]
A Part-Time CISO Can Help Boost Cybersecurity Outcomes
Companies today have a big problem. There are all sorts of challenges and pain points in the modern digital business related to resource allocation and planning, but one that’s pretty high on the list is cybersecurity. Let’s face it: businesses are vulnerable to a lot of different threat vectors. Cyberattacks are proliferating, and more complex […]
Temporary CISO: Weighing the Pros and Cons
In 2023, the average data breach cost hit $4.45 million. That’s a staggering number, and it’s rising every year. But here’s the kicker: most companies still don’t have a dedicated Chief Information Security Officer (CISO). Why? Budget constraints, talent shortages, or just not knowing where to start. That’s where a temporary CISO comes in. No […]