Threat Led Penetration Testing: Simulating Tomorrow’s Attacks, Today
by Athan Georgopoulos | July 11, 2025 | BLOG | 0 Comments
Security technology evolves, but so do cybercriminals and threat actors. They are sophisticated and skilled, equipped with advanced toolboxes and knowledge about complex digital systems to conduct...
Why You Need A Penetration Test Like You Need A Vaccine
by George Roumeliotis | May 23, 2025 | BLOG | 0 Comments
Would you wait until you caught a deadly disease before seeing a doctor? Penetration Testing: Your Cybersecurity Vaccine Think of a penetration test—or pentest—as a cybersecurity vaccine. Just like...
Digital Operational Resilience Act – DORA – Part II
by Ioanna Dima | March 7, 2025 | BLOG | 0 Comments
Intro Hello and welcome to the second part of our two-part blog post where we take a deep dive into the Digital Operational Resilience Act (DORA). For those of you who join us now, I would advise...
Digital Operational Resilience Act – DORA
by Ioanna Dima | February 26, 2025 | BLOG | 0 Comments
Hello, welcome to our deep dive into the Digital Operational Resilience Act (DORA), a pivotal regulatory framework reshaping cybersecurity and operational resilience in the European financial...
The EU NIS 2 Directive
by Ioanna Dima | October 11, 2024 | BLOG | 0 Comments
The NIS 2 Directive (Directive (EU) 2022/2555), adopted by the European Parliament and Council on 14 December 2022, marks a significant legislative effort to enhance cybersecurity and resilience...