Our place for thought sharing, question answering and news announcing.
Whether you lead, work for, or invest in a company early in its cybersecurity journey, this article will help you understand the what, why, and when of cybersecurity frameworks.
See moreThis guide helps startups understand when to pen test, how to pen test, and how much to spend on pen testing. Plus, the latest legal pen testing requirements for startups in 2026.
See moreFrom a hacker’s perspective, an LLM-powered app can look like a cooperative insider. In this blog post, we explain why LLM integrations are inherently risky, the real-world attacks they face, and why specialised penetration testing is essential.
See moreDORA, ISO 27001, and NIST CSF may look similar on the surface, and plenty of gap analysis templates promise to align them. But here’s why that might not be the best idea.
See moreThanks to DORA's principle of proportionality, smaller organisations face lighter requirements than larger financial entities in many areas and are fully exempt from others. Here's what microenterprises need to know.
See moreAll DORA-covered entities must test their systems using what DORA refers to as "appropriate tests” to ensure they are resilient. So, what is an “appropriate test”?
See moreThank you!
Please try again later.