Horac Effective IoT Governance The IoT Explosion It usually begins innocently. Someone installs a “smart” coffee machine in the breakroom, another person connects a smartwatch to the corporate Wi-Fi, and suddenly your company netwo... 28.08.2025
Horac A small business guide to compliance Why Small Businesses Can’t Ignore Compliance and Risk Management Many small and medium-sized enterprises (SMEs) still cling to the idea that cyber threats and strict regulations are only a problem for... 13.08.2025
Horac Project Management Meets Cybersecurity Why Project Management Matters There was a time when project management meant keeping deadlines straight and making sure budgets didn’t mysteriously evaporate halfway through. Those days are long gone... 08.08.2025
Horac How to Write Cybersecurity Policies Employees Actually Follow Why Cybersecurity Policies Fail in Practice Most companies aren’t short on cybersecurity policies — they’re short on policies people actually follow. Somewhere between the legal team’s caution and IT’... 31.07.2025
Horac Build your DORA Risk Register The Digital Operational Resilience Act (DORA) and its Challenges The Digital Operational Resilience Act (DORA) marks a significant step forward in ensuring that financial institutions across the Europ... 24.07.2025
Horac Governance for Security, not Compliance The Illusion of Safety Most organizations proudly display their security credentials. ISO 27001? ✔️ SOC 2? ✔️ Annual pen test? ✔️ The paperwork looks solid. But compliance does not equal security . Au... 18.07.2025
Horac "Sign in with Google": Riskier than you think The Changing Perimeter Once upon a time, the security perimeter was simple: lock down the firewall, set up a VPN, and sleep (somewhat) peacefully. But since SaaS platforms took over the world, that pe... 09.07.2025
Horac Incident Response Playbooks Part 2: How to Detect, Contain, and Recover Fast Click here to read part 1 of this series Containment, Eradication, and Recovery – Cutting Off the Fire Once an incident is confirmed, the clock starts ticking. Every minute counts — not just to stop t... 04.07.2025
Horac Incident Response Playbooks Part 1: How to Detect, Contain, and Recover Fast The Foundations of Incident Management Every organization, no matter how big or small, will face a security incident at some point. Whether it's a phishing email that slips through the cracks or an in... 26.06.2025
Horac CRA Explained The Rise of Product Cybersecurity Regulation in the EU Everything from your fridge to your factory relies on software. That’s great for innovation—and also a jackpot for attackers. The EU has responde... 18.06.2025
Horac NIS2 in Healthcare: Do's and Dont's The Rising Cyber Risk in Healthcare It’s no secret that healthcare is under a lot of pressure from cyber criminals. As hospitals and clinics embrace digital tools such as cloud-based records and even ... 16.06.2025
Horac Is your data safe for the Quantum era? Why Post-Quantum Cryptography Matters Now Quantum computing is no longer science fiction. It’s quietly moving from theory to practical threat. While mainstream quantum computers still have limitations... 28.05.2025