What is the NIS2 Directive? The NIS 2 Directive is the successor to the EU’s first cybersecurity directive, the NIS Directive on Security of Network and Information Systems, adopted in 2016[1]. While the original NIS Directive was a significant...
Articles
All our articles on Cybersecurity
This is the Cybersecurity category description
ISO 27001 qualification: a guarantee for digital asset security
ISO 27001: an international framework for security management ISO 27001 is an international standard defining an Information Security Management System (ISMS). It enforces a structured methodology for identifying, evaluating, and addressing risks...
Understanding DORA regulation: what are the implications for investors?
Objectives and scope of DORA DORA aims to establish a harmonised framework for managing technological risks across the European financial sector. It applies to a wide range of stakeholders, including banks, insurance companies, payment...
Enhancing Tech Due Diligence with Network Footprinting
What is Network Footprinting? Network footprinting is a reconnaissance process used in cybersecurity to gather information about a computer network. This information-gathering phase is typically the first step in assessing a network’s...
What is code quality and why is it important?
What is code quality? Code quality is synonymous with software that is maintainable, efficient, reliable, and secure. For a programmer, high quality code means, in its simplest form, source code that can be understood quickly.For a company or...
2024 Tech Trends: AI, Cybersecurity, SaaS and Green Tech
The Evolution of Artificial IntelligenceArtificial intelligence continues to advance at an unprecedented rate. Generative AI models, particularly known for their ability to emulate and enhance human processes, are increasingly being integrated into...
The Rising Tide of Data Breaches in 2023
The Escalating Landscape of Data BreachesThis year, the complexity and frequency of data breaches reached alarming levels. IBM's study revealed that the average data breach now burdens businesses with costs upwards of $4.24 million, a 10% hike from...
French LPM 2024-2030 Law: How it Impacts Software Companies
The recent French 2024-2030 military programming law (LPM) sets forth new defense-related provisions applicable to the private sector, including the obligation for software companies to notify the French National Information Systems Security...
Cybersecurity Checklist and Cyber Health Check
1. User Access ControlControlled user access is paramount for any business serious about its cybersecurity. Access rights should be meticulously determined and conferred according to roles within the organization. Every employee ought to have...
Can Artificial Intelligence improve source code quality?
The influence of Artificial Intelligence on source code qualityAI-powered tools can analyse and optimise source code, offering new dimensions in enhancing source code quality. These AI mechanisms can identify coding errors and potential security...
Review: What Can We Learn From the Cyberattacks in 2022?
The Scale of Cyberattacks in 2022Last year, the frequency of cyberattacks skyrocketed by 600%, a staggering increase that highlighted how the COVID-19 pandemic has amplified cyber risks.¹ Public sector institutions, including hospitals and local...
Cybersecurity Best Practices
Common Vulnerabilities and Their Real-World ImpactCybersecurity breaches are not just hypothetical threats - they are real, impactful, and alarmingly frequent. To illustrate the depth of these threats, we will spotlight a few common vulnerabilities...
How to Carry Out a Successful Cyber Security Audit
Definition of a cyber security auditA cyber security audit can be defined as a thorough inspection of a company’s information system in its entirety and in detail. The objective is to verify and test the integrity of the physical and software...
What is Cybersecurity Due Diligence?
Cybersecurity due diligence provides insight into an organisation’s current risk management program, data protection procedures, certifications, and infrastructure protections, to ensure that the organisation will receive results that allow them to...
The Hidden Value of Cybersecurity
Last year, the worldwide cost of cybercrime reached $6 trillion and shows no signs of slowing down as studies predict that the damage costs will reach $10.5 trillion by 2025. With this in mind, and with the knowledge that every 11 seconds another...
Responding to the Rise in M&A Activities
If 2021 was a big year for European dealmaking, 2022 looks set to be even better. Currently the UK is western Europe’s M&A hotbed, accounting for more than 32% of deals in 2021 (1) and has seen a £1.1 billion increase in domestic M&As in...
3 Key Trends Driving M&A in 2022
While the world has faced major challenges from the ongoing COVID-19 pandemic, these disruptions have also created many opportunities. Nowhere is this truer than in the technology industry, which has been by far the most active area for...
Top 3 risks to be aware of in High Tech M&A deals
1. Cyber RisksM&A transactions are fertile ground for cyber criminals providing them with both short and long term opportunities. In the short term, with business operations in transition, data is more vulnerable and at higher risk of...
Global Trends in Cyber Risk
Ransomware On The RiseThe scale and scope of ransomware attacks are increasing at an unprecedented rate. This is due to a combination of factors including the rapid rise of digitalization, growing use of cryptocurrencies, increased...