Horac Unwrapping Holiday Cyber Threats Introduction The holiday season is a time of joy, celebration, and relaxation for many. However, it’s also a period when cybersecurity risks peak, posing significant challenges for individuals and org... 19.12.2025 Sicherheits- und Compliance-Experten
Horac A Cybersecurity Framework for Beginners (2025) The NIST Cybersecurity Framework (CSF) is a voluntary framework that helps organizations manage cybersecurity risk. Developed by the National Institute of Standards and Technology (NIST), the NIST CSF... 04.12.2025 Sicherheits- und Compliance-Experten
Horac AI in GRC Challenges of AI in GRC Welcome to 2025, where the biggest debates in governance, risk, and compliance aren’t about if AI belongs, but how to keep it from running the whole show, and ensure that there... 14.11.2025 Sicherheits- und Compliance-Experten
Horac Fix your vendor lifecycle management When most organizations talk about vendor management, what they really mean is procurement. Once the (digital) ink is dry on a contract and the vendor’s invoice hits the accounting system, everyone ex... 05.11.2025 Sicherheits- und Compliance-Experten
Horac Fixing your manual evidence collection The Audit Season Begins Audits get a bad reputation but their real value shouldn’t be underestimated. A good audit is an opportunity for an external expert to test your security posture and challenge ... 16.10.2025 Sicherheits- und Compliance-Experten
Horac Training, Awareness, and Engagement Many organizations proudly achieve their ISO 27001 certification , yet still face breaches that come from something far less technical: human error. A misplaced click, a weak password, or a casual app... 15.10.2025 Sicherheits- und Compliance-Experten
Horac Operational Technology meets governance The Rise of OT in Critical Sectors Operational Technology (OT) has quietly powered the backbone of industries for decades. Think assembly lines in manufacturing, control systems in power plants, traff... 01.10.2025 Sicherheits- und Compliance-Experten
Horac How to map ICT assets to business processes The Overlooked Connection Two Worlds That Don’t Talk In most organizations, ICT assets and business processes live in different universes. The IT team maintains an inventory of servers, laptops, and S... 25.09.2025 Sicherheits- und Compliance-Experten
Horac Living With MiCAR MiCAR in a nutshell A Regulation That Needs No Invitation The Markets in Crypto-Assets Regulation (MiCAR) already crossed Luxembourg’s doorstep months ago, but it’s still a challenge for many organiza... 04.09.2025 Sicherheits- und Compliance-Experten
Horac Effective IoT Governance The IoT Explosion It usually begins innocently. Someone installs a “smart” coffee machine in the breakroom, another person connects a smartwatch to the corporate Wi-Fi, and suddenly your company netwo... 28.08.2025 Sicherheits- und Compliance-Experten
Horac A small business guide to compliance Why Small Businesses Can’t Ignore Compliance and Risk Management Many small and medium-sized enterprises (SMEs) still cling to the idea that cyber threats and strict regulations are only a problem for... 13.08.2025 Sicherheits- und Compliance-Experten
Horac Project Management Meets Cybersecurity Why Project Management Matters There was a time when project management meant keeping deadlines straight and making sure budgets didn’t mysteriously evaporate halfway through. Those days are long gone... 08.08.2025 Sicherheits- und Compliance-Experten