Explore cyber compliance blogs

Discover a curated collection of blogs covering cybersecurity frameworks, industry updates, and expert tips.Dive into content designed to inform and guide you in mastering compliance and security.

Latest blog posts

Who does CRA apply to? Scope & Applicability

Find out who must comply with the Cyber Resilience Act, when it applies, if it's mandatory, and how to comply with CRA requirements in the EU.
Read more

How to comply with the Cyber Resilience Act (CRA)?

Learn how to comply step-by-step with CRA, the Cyber Resilience Act, and what tools help you get there quick.
Read more

What does CRA require?

Step-by-step Cyber Resilience Act compliance guide covering key requirements, responsibilities, tools, and how to meet CRA obligations fast.
Read more

Frameworks

Who does CRA apply to? Scope & Applicability

Find out who must comply with the Cyber Resilience Act, when it applies, if it's mandatory, and how to comply with CRA requirements in the EU.
Read more

How to comply with the Cyber Resilience Act (CRA)?

Learn how to comply step-by-step with CRA, the Cyber Resilience Act, and what tools help you get there quick.
Read more

What does CRA require?

Step-by-step Cyber Resilience Act compliance guide covering key requirements, responsibilities, tools, and how to meet CRA obligations fast.
Read more

Partner portal

What is a vCISO? Understanding the role of virtual CISO

What is a vCISO, what they do, and why the virtual CISO model is growing fast among companies and cybersecurity consultants.
Read more

What is a modular cyber security framework and why they are essential for consultants

Modular cyber security frameworks make compliance management easier, and helps consultants scale faster, win more deals, and build recurring revenue.
Read more

End of hourly billing: why value-based pricing works for compliance consultants

Hourly billing is fading fast in compliance consulting. Learn why value-based pricing better aligns incentives, boosts earnings, and how compliance consultants can transition effectively.
Read more

Framework collections

ISO 27001

ISO 27001 is the global standard for establishing, implementing, and maintaining an Information Security Management System (ISMS). This framework helps organizations manage risks to their data security, ensuring confidentiality, integrity, and availability.
Connected blogs:

NIS 2 (Network and Information Security Directive 2)

NIS 2 expands on the original NIS Directive, setting updated cybersecurity requirements for critical infrastructure sectors across the European Union. It emphasizes resilience, incident reporting, and supply chain security.
Connected blogs:

Explore more blog posts