Category: Sections

Post-quantum cryptography is here: what are the consequences and actions for large organisations? 

This summer's post-quantum news: what you need to know  This summer marks a major breakthrough in cybersecurity with the publication of the NIST standards for post-quantum cryptography. This publication is the culmination of many years of work, the standardisation process…

Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem

The Cyber Resilience Act (CRA) represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount. The…

Navigating The Cybersecurity Talent Management Maze: A Guide for Talent Management Enthusiasts

Are you a CISO, Talent Manager or Cybersecurity Specialist grappling with the challenge of recruiting and retaining top-notch cybersecurity talents? You’re not alone. Recruiting in cybersecurity is increasingly challenging, with 4 million jobs currently unfilled – a 13% rise from…

Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking

Not familiar with CMMC 2.0? For more information regarding CMMC 2.0, please refer to this article. The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive framework designed to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), shared with…

Back to top