by Jean Albert | Feb 7, 2025 | Cybersecurity
What is the NIS2 Directive?The NIS 2 Directive is the successor to the EU’s first cybersecurity directive, the NIS Directive on Security of Network and Information Systems, adopted in 2016[1]. While the original NIS Directive was a significant step in establishing a...
by Olivier Clef | Dec 24, 2024 | Cybersecurity, Tech Due Diligence
ISO 27001: an international framework for security management ISO 27001 is an international standard defining an Information Security Management System (ISMS). It enforces a structured methodology for identifying, evaluating, and addressing risks related to data...
by Philippe Thomas | Dec 12, 2024 | Cybersecurity, Tech Due Diligence
Objectives and scope of DORA DORA aims to establish a harmonised framework for managing technological risks across the European financial sector. It applies to a wide range of stakeholders, including banks, insurance companies, payment institutions, crowdfunding...
by Kristin A. | Oct 17, 2024 | Cybersecurity, Tech Due Diligence
What is Network Footprinting? Network footprinting is a reconnaissance process used in cybersecurity to gather information about a computer network. This information-gathering phase is typically the first step in assessing a network’s vulnerabilities. The process...
by Kristin A. | Feb 12, 2024 | Cybersecurity, Tech Due Diligence
What is code quality? Code quality is synonymous with software that is maintainable, efficient, reliable, and secure. For a programmer, high quality code means, in its simplest form, source code that can be understood quickly.For a company or investor, high quality...
by Marine Yborra | Jan 29, 2024 | Cybersecurity, Tech Due Diligence
The Evolution of Artificial IntelligenceArtificial intelligence continues to advance at an unprecedented rate. Generative AI models, particularly known for their ability to emulate and enhance human processes, are increasingly being integrated into various...