More Articles

CRA

Understanding the Cyber Resilience Act: What Product Manufacturers Need to Know

The Cyber Resilience Act introduces mandatory security and transparency requirements for product manufacturers. We break down the key obligations, compliance timeline, and practical implementation considerations for hardware and software vendors.

Compliance

Building a NIS2-Compliant Security Programme from Scratch

New to NIS2? We guide you through building a security programme that meets the Directive's governance, risk management, and incident response requirements. Step-by-step practical advice for organisations starting their compliance journey.

CISO

Fractional CISO: When Does It Make Sense?

Not every organisation needs (or can afford) a full-time Chief Information Security Officer. We explore when fractional CISO services deliver value, how to structure the engagement, and what to expect from on-demand security leadership.

NIS2

Supply Chain Security under NIS2: Obligations and Best Practices

NIS2 extends responsibility to third-party and supplier risk. Learn how to map your supply chain dependencies, assess vendor risk maturity, and implement practical controls that satisfy regulatory expectations without creating operational friction.

Risk Management

Risk Management 101: ISO 27005 in Practice

ISO 27005 is the foundation for structured risk management. This guide walks through the risk identification, analysis, and treatment process — with real-world examples of how to make risk management speak the language of your business and board.

EU Regulation

DORA for Financial Institutions: Digital Operational Resilience in Practice

The Digital Operational Resilience Act reshapes how financial services firms manage ICT risk. We break down the testing requirements, incident thresholds, third-party risk management, and governance expectations — with a focus on practical implementation.