← Back to Home
Learn

Cybersecurity knowledge, the working reference

Reference entries for the regulations, methodologies and threat patterns we get asked about most — NIS2, DORA, the EU AI Act, the Cyber Resilience Act, continuous threat exposure management (CTEM), SBOM, prompt injection, post-quantum cryptography. Two kinds: definitions answer "what is X", playbooks answer "what do I do when X happens". All ungated, all updated regularly, all source-cited.

Definitions

Playbooks

Frequently asked

What is the difference between NIS2 and DORA?+

NIS2 (Directive 2022/2555) is the horizontal EU cybersecurity regime covering essential and important entities across most regulated sectors. DORA (Regulation 2022/2554) is the financial-sector-specific regime with stricter obligations on ICT operational resilience, TLPT (Threat-Led Penetration Testing) and ICT-third-party risk. Financial entities are subject to both in parallel.

Does the EU Cyber Resilience Act (CRA) apply to my product?+

The CRA applies to any "product with digital elements" — hardware or software — that connects directly or indirectly to a device or network and is placed on the EU market. Full application begins 11 December 2027; reporting obligations under Article 14 already apply from 11 September 2026. Open-source non-commercial contributors are out of scope; anyone monetising open source is in.

What is CTEM and how does it differ from a pentest?+

Continuous Threat Exposure Management (CTEM) is a five-stage cyclic program (scoping, discovery, prioritization, validation, mobilization) that keeps an organisation's exposure surface measured and provably reduced in continuous fashion. A pentest produces a point-in-time report; CTEM produces a continuously updated exposure ledger with cryptographic evidence per remediated item.

When does prompt injection (OWASP LLM01) become a regulatory issue?+

For LLM-powered systems that fall under the EU AI Act Annex III (high-risk), prompt-injection resistance is part of the Article 15 cybersecurity conformity property. For LLM tools used inside NIS2 essential and important entities, the same control sits under "appropriate and proportionate technical and organisational measures". A vendor that cannot demonstrate layered defences against prompt injection is already at procurement disadvantage.

Should I start a post-quantum cryptography (PQC) migration now?+

Yes for any data with a confidentiality lifetime extending past the cryptographically relevant quantum computer (CRQC) horizon (typically 5-15 years). The "harvest now, decrypt later" threat model means encrypted traffic exfiltrated today can be decrypted retroactively once a CRQC exists. Hybrid TLS (X25519MLKEM768) and cryptographic inventory are the practical first steps for 2026.