Articles

All our articles on Cybersecurity

This is the Cybersecurity category description

Understanding the NIS2 Directive: definition and scope

Understanding the NIS2 Directive: definition and scope

What is the NIS2 Directive? The NIS 2 Directive is the successor to the EU’s first cybersecurity directive, the NIS Directive on Security of Network and Information Systems, adopted in 2016[1]. While the original NIS Directive was a significant...

ISO 27001 qualification: a guarantee for digital asset security

ISO 27001 qualification: a guarantee for digital asset security

ISO 27001: an international framework for security management ISO 27001 is an international standard defining an Information Security Management System (ISMS). It enforces a structured methodology for identifying, evaluating, and addressing risks...

Enhancing Tech Due Diligence with Network Footprinting

Enhancing Tech Due Diligence with Network Footprinting

What is Network Footprinting? Network footprinting is a reconnaissance process used in cybersecurity to gather information about a computer network. This information-gathering phase is typically the first step in assessing a network’s...

What is code quality and why is it important?

What is code quality and why is it important?

What is code quality? Code quality is synonymous with software that is maintainable, efficient, reliable, and secure. For a programmer, high quality code means, in its simplest form, source code that can be understood quickly.For a company or...

2024 Tech Trends: AI, Cybersecurity, SaaS and Green Tech

2024 Tech Trends: AI, Cybersecurity, SaaS and Green Tech

The Evolution of Artificial IntelligenceArtificial intelligence continues to advance at an unprecedented rate. Generative AI models, particularly known for their ability to emulate and enhance human processes, are increasingly being integrated into...

The Rising Tide of Data Breaches in 2023

The Rising Tide of Data Breaches in 2023

The Escalating Landscape of Data BreachesThis year, the complexity and frequency of data breaches reached alarming levels. IBM's study revealed that the average data breach now burdens businesses with costs upwards of $4.24 million, a 10% hike from...

French LPM 2024-2030 Law: How it Impacts Software Companies

French LPM 2024-2030 Law: How it Impacts Software Companies

The recent French 2024-2030 military programming law (LPM) sets forth new defense-related provisions applicable to the private sector, including the obligation for software companies to notify the French National Information Systems Security...

Cybersecurity Checklist and Cyber Health Check

Cybersecurity Checklist and Cyber Health Check

1. User Access ControlControlled user access is paramount for any business serious about its cybersecurity. Access rights should be meticulously determined and conferred according to roles within the organization. Every employee ought to have...

Can Artificial Intelligence improve source code quality?

Can Artificial Intelligence improve source code quality?

The influence of Artificial Intelligence on source code qualityAI-powered tools can analyse and optimise source code, offering new dimensions in enhancing source code quality. These AI mechanisms can identify coding errors and potential security...

Review: What Can We Learn From the Cyberattacks in 2022?

Review: What Can We Learn From the Cyberattacks in 2022?

The Scale of Cyberattacks in 2022Last year, the frequency of cyberattacks skyrocketed by 600%, a staggering increase that highlighted how the COVID-19 pandemic has amplified cyber risks.¹ Public sector institutions, including hospitals and local...

Cybersecurity Best Practices

Cybersecurity Best Practices

Common Vulnerabilities and Their Real-World ImpactCybersecurity breaches are not just hypothetical threats - they are real, impactful, and alarmingly frequent. To illustrate the depth of these threats, we will spotlight a few common vulnerabilities...

How to Carry Out a Successful Cyber Security Audit

How to Carry Out a Successful Cyber Security Audit

Definition of a cyber security auditA cyber security audit can be defined as a thorough inspection of a company’s information system in its entirety and in detail. The objective is to verify and test the integrity of the physical and software...

What is Cybersecurity Due Diligence?

What is Cybersecurity Due Diligence?

Cybersecurity due diligence provides insight into an organisation’s current risk management program, data protection procedures, certifications, and infrastructure protections, to ensure that the organisation will receive results that allow them to...

The Hidden Value of Cybersecurity

The Hidden Value of Cybersecurity

Last year, the worldwide cost of cybercrime reached $6 trillion and shows no signs of slowing down as studies predict that the damage costs will reach $10.5 trillion by 2025. With this in mind, and with the knowledge that every 11 seconds another...

Responding to the Rise in M&A Activities

Responding to the Rise in M&A Activities

If 2021 was a big year for European dealmaking, 2022 looks set to be even better. Currently the UK is western Europe’s M&A hotbed, accounting for more than 32% of deals in 2021 (1) and has seen a £1.1 billion increase in domestic M&As in...

3 Key Trends Driving M&A in 2022

3 Key Trends Driving M&A in 2022

While the world has faced major challenges from the ongoing COVID-19 pandemic, these disruptions have also created many opportunities.  Nowhere is this truer than in the technology industry, which has been by far the most active area for...

Top 3 risks to be aware of in High Tech M&A deals

Top 3 risks to be aware of in High Tech M&A deals

1. Cyber RisksM&A transactions are fertile ground for cyber criminals providing them with both short and long term opportunities. In the short term, with business operations in transition, data is more vulnerable and at higher risk of...

Global Trends in Cyber Risk

Global Trends in Cyber Risk

Ransomware On The RiseThe scale and scope of ransomware attacks are increasing at an unprecedented rate. This is due to a combination of factors including the rapid rise of digitalization, growing use of cryptocurrencies, increased...