Learn how to align your ISO 27001 ISMS with EU DORA requirements. Explore key differences, additional deliverables, and practical steps for financial sector compliance in…
Learn how to align your cloud strategy with NIS2 and future regulations. Explore key compliance steps, risk management, and security tools to ensure long-term data…
The upcoming Network and Information Security Directive 2 (NIS2) legislation is a significant development for businesses operating across the EU. This blog post outlines the…
Explore the evolving role of CISOs as they navigate increasing regulatory challenges in cybersecurity. Learn about key laws, risk management, resilience, supply chain security, and…
As a CISO, it is crucial to understand your responsibilities when it comes to cloud security. The cloud offers numerous benefits, but it also presents…
Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.
As businesses continue to shift towards cloud-based operations, it’s crucial to ensure that your online systems access is properly secured. One key tool is Conditional…
In this blog, we cover continuous assessment and the benefits that it brings to the table.
Microsoft has recognized our level of expertise and awarded us this new level of partnership.
We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.