By

webeditorhere
Understanding Article 60 of MiCA The Markets in Crypto-Assets (MiCA) Regulation introduces notification requirements for financial entities seeking to provide crypto-asset services in the European Union. Under Article 60, entities must submit a detailed notification that includes key ICT and cybersecurity documentation, ensuring compliance with DORA (Digital Operational Resilience Act) and other regulatory frameworks. At...
Read More
Whether mandated by regulations or driven by a voluntary commitment to excellence, companies of all sizes and industries must prioritize information security and cybersecurity to protect their assets, data, and reputation. Why Security Matters Beyond Regulatory Obligations While some businesses are required by law to implement cybersecurity frameworks, others may operate in jurisdictions without specific...
Read More
Today, the Digital Operational Resilience Act (DORA) officially came into force, marking a significant shift in the way financial entities across the European Union (EU) manage their information and communication technology (ICT) risks. As one of the most important regulatory developments in recent years, DORA aims to strengthen the operational resilience of the EU financial...
Read More
Konkrit Solutions is thrilled to announce our participation in the upcoming iFX EXPO in Dubai, a premier event for professionals in the fintech and financial services sectors. As a technology company at the forefront of IT services and innovation, we are excited to connect with industry leaders, showcase our expertise, and explore opportunities for collaboration....
Read More
The Cyprus Securities and Exchange Commission (the “CySEC”) on December 10th, 2024, issued Circular C668, regarding the workshop on preparing the register of information under the Digital Operational Resilience Act (the “Circular”). Following the issuance of the Circular, CySEC wishes to inform Financial Entities* of an upcoming workshop initiated by the European Supervisory Authorities (ESAs)...
Read More
As cyberattacks become more sophisticated and widespread than ever before, no organization, regardless of size or industry, is immune to these threats. To counter this ever-growing challenge, businesses, governments, and cybersecurity professionals must work together. Collaboration and information sharing are no longer optional, they are essential strategies for building a resilient cybersecurity ecosystem. The Digital...
Read More
The European Supervisory Authorities (ESAs) have announced critical timelines for financial entities to submit their registers of information on contractual arrangements with ICT third-party service providers, as required under the Digital Operational Resilience Act (DORA). Key Information Submission Deadline: Financial entities must ensure their registers of information are prepared and submitted to competent authorities ahead...
Read More
With cyberattacks becoming increasingly common and complex, the need for a Security Operations Center (SOC) has never been more critical. Organizations are dedicating resources to SOCs to defend their data, systems, and intellectual assets. This article examines the role, organization, and operations of a SOC, as well as the challenges and rewards associated with building...
Read More
As financial institutions encounter growing demands to meet regulatory requirements and safeguard sensitive information, the importance of the Chief Information Security Officer (CISO) has become crucial. With the introduction of new regulations like the Digital Operational Resilience Act (DORA), financial entities must be well-prepared to handle Information and Communication Technology (ICT) risks and address cybersecurity...
Read More
Penetration testing, commonly known as pen testing, is a vital cybersecurity practice where ethical hackers mimic cyberattacks on systems, networks, or applications to discover and exploit potential weaknesses. A key issue that pen testing can reveal is the existence of backdoors—unauthorized access points that allow attackers to bypass standard security protocols. However, backdoors are just...
Read More
1 2 3 4 6