Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Adopt DORA's Threat-Led Penetration Testing Requirements

The new Digital Operational Resilience Act (DORA) requires significant financial entities in the EU to carry out Threat-Led Penetration Testing (TLPTs) on a regular basis. However, the skills required along with the planning for these types of exercises can prove difficult and time consuming. During this session, Kroll brings together our red teaming, threat intelligence and DORA regulatory compliance experts to provide practical guidance on how security, risk and resiliency leaders can adopt a sustainable threat-led penetration testing (TLPT) program as required by DORA.

Exploring DORA Compliance in Practice: Key Takeaways from Our Recent Webinar

When I speak to customers across EMEA, one thing is clear: regulations like the EU's Digital Operational Resilience Act (DORA) are becoming very real, very fast. Financial institutions and their service providers are being asked to do more than ever before to demonstrate secure operations, especially when it comes to managing access to infrastructure. That's exactly why we hosted a recent webinar in partnership with Falx. The goal?

PIVOTT Act Revived to Tackle Growing Cybersecurity Workforce Shortages

The cyber workforce gap is one of the most pressing and persistent challenges facing the cybersecurity industry. In 2024, ISC2 found that the gap amounted to 4.8 million people globally, up 19% from the previous year. Both public and private sector organizations – including the UK’s NCSC and the SANS Institute – have introduced countless initiatives in an attempt to close the cyber workforce gap, but it keeps growing. Perhaps the US PIVOTT Act will work better?

DORA Compliance: Why Its Important for Financial Businesses in 2025?

This blog will help you understand what the Digital Operational Resilience Act (DORA) means for your business. Youll learn what steps to take and how to stay on track with DORA compliance. Its a simple guide to help your company reduce cyber risks, avoid fines, and stay strong against online threats.

How Businesses Using GPT 4.1 Can Comply With DPDP's Data Residency Bill

Until 2023, India’s data privacy landscape was largely unregulated – businesses didn’t have to worry about how they process and store data. Sensitive customer data like Personally Identifiable Information (PII) could travel around the world in 80 days and land back to its source without violating a single regulation. While the unregulated digital space was a boon for data dependent businesses, it was a bane for customer privacy.

New Bill Mandates Cybersecurity Overhaul for Federal Contractors

New cybersecurity legislation is coming thick and fast. And for good reason: cyber threats are becoming more sophisticated, systems are becoming more connected, and geopolitical relationships are becoming more fraught. One of the most recent bipartisan legislations – the US Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025 – is designed to modernize cybersecurity standards in the US and protect the country from threats.

Who Must Comply with CCPA? California Compliance Guide

The California Consumer Privacy Act (CCPA) is the first comprehensive California data privacy law granting consumers control over how their personal information is collected, used, and shared. It was enacted in 2018 and took effect on January 1, 2020, signaling a national shift in privacy regulations. With increasing emphasis on transparency and accountability, businesses must now adhere to a new standard in consumer data protection California.

Smart Africa Unveils 5-Year Cybersecurity Plan to Strengthen Digital Resilience

Africa has made huge strides in digital transformation in the past few years. For example, over 160 million Africans gained broadband internet access between 2019 and 2022. As the continent embraces digitalization, cybersecurity is becoming an increasingly pressing concern.

Digital supply chain security: How to secure your supply chain with DLP and Secude

Data loss prevention (DLP) software provides strong protection after data is stored, Secude provides Zero Trust protection before data is stored. Together, they secure your digital supply chain. Ensuring digital supply chain security is a fundamental part of the EU’s NIS2 Directive - and for good reason. In recent years, digital supply chains have become the main targets of cyberwarfare, with supply chain attacks rising 2,600% since 2018.