By

webeditorhere
The Cyprus Securities and Exchange Commission (the “CySEC”) on December 10th, 2024, issued Circular C668, regarding the workshop on preparing the register of information under the Digital Operational Resilience Act (the “Circular”). Following the issuance of the Circular, CySEC wishes to inform Financial Entities* of an upcoming workshop initiated by the European Supervisory Authorities (ESAs)...
Read More
As cyberattacks become more sophisticated and widespread than ever before, no organization, regardless of size or industry, is immune to these threats. To counter this ever-growing challenge, businesses, governments, and cybersecurity professionals must work together. Collaboration and information sharing are no longer optional, they are essential strategies for building a resilient cybersecurity ecosystem. The Digital...
Read More
The European Supervisory Authorities (ESAs) have announced critical timelines for financial entities to submit their registers of information on contractual arrangements with ICT third-party service providers, as required under the Digital Operational Resilience Act (DORA). Key Information Submission Deadline: Financial entities must ensure their registers of information are prepared and submitted to competent authorities ahead...
Read More
With cyberattacks becoming increasingly common and complex, the need for a Security Operations Center (SOC) has never been more critical. Organizations are dedicating resources to SOCs to defend their data, systems, and intellectual assets. This article examines the role, organization, and operations of a SOC, as well as the challenges and rewards associated with building...
Read More
As financial institutions encounter growing demands to meet regulatory requirements and safeguard sensitive information, the importance of the Chief Information Security Officer (CISO) has become crucial. With the introduction of new regulations like the Digital Operational Resilience Act (DORA), financial entities must be well-prepared to handle Information and Communication Technology (ICT) risks and address cybersecurity...
Read More
Penetration testing, commonly known as pen testing, is a vital cybersecurity practice where ethical hackers mimic cyberattacks on systems, networks, or applications to discover and exploit potential weaknesses. A key issue that pen testing can reveal is the existence of backdoors—unauthorized access points that allow attackers to bypass standard security protocols. However, backdoors are just...
Read More
As the Digital Operational Resilience Act (DORA) comes into force on January 17, 2025, organizations in the financial services industry must take swift action to ensure compliance. This regulation goes beyond ticking boxes; it establishes a vital framework designed to enhance the digital resilience of companies and protect their key assets, including but not limited...
Read More
What is Deepfake? Deepfakes are an advanced type of synthetic media created using artificial intelligence (AI) to produce highly realistic videos, images, or audio recordings that replicate a person’s appearance and voice. By utilizing deep learning and neural networks, creators can alter existing media or produce entirely new content, making it seem as if individuals...
Read More
Digital transformation is a powerful way to unlock efficiency, insight, and growth for your business. However, it’s important to recognize that this is a significant change that should be approached thoughtfully and incrementally. Each step in this transformation journey—starting with document management, moving through Enterprise Resource Planning (ERP) integration, and culminating in AI-driven analytics—not only...
Read More
August 1st marks a significant milestone with the implementation of the European Artificial Intelligence Act (AI Act), the world’s first comprehensive regulation on artificial intelligence (AI). This landmark legislation ensures that AI developed and used in the European Union (EU) is trustworthy, safeguarding fundamental rights. The AI Act aims to establish a unified internal market...
Read More
1 2 3 4 5