Horac A Cybersecurity Framework for Beginners (2025) The NIST Cybersecurity Framework (CSF) is a voluntary framework that helps organizations manage cybersecurity risk. Developed by the National Institute of Standards and Technology (NIST), the NIST CSF... Dec 4, 2025
Horac AI in GRC Challenges of AI in GRC Welcome to 2025, where the biggest debates in governance, risk, and compliance aren’t about if AI belongs, but how to keep it from running the whole show, and ensure that there... Nov 14, 2025
Horac Fix your vendor lifecycle management When most organizations talk about vendor management, what they really mean is procurement. Once the (digital) ink is dry on a contract and the vendor’s invoice hits the accounting system, everyone ex... Nov 5, 2025
Horac Fixing your manual evidence collection The Audit Season Begins Audits get a bad reputation but their real value shouldn’t be underestimated. A good audit is an opportunity for an external expert to test your security posture and challenge ... Oct 16, 2025
Horac Training, Awareness, and Engagement Many organizations proudly achieve their ISO 27001 certification , yet still face breaches that come from something far less technical: human error. A misplaced click, a weak password, or a casual app... Oct 15, 2025
Horac Operational Technology meets governance The Rise of OT in Critical Sectors Operational Technology (OT) has quietly powered the backbone of industries for decades. Think assembly lines in manufacturing, control systems in power plants, traff... Oct 1, 2025
Horac How to map ICT assets to business processes The Overlooked Connection Two Worlds That Don’t Talk In most organizations, ICT assets and business processes live in different universes. The IT team maintains an inventory of servers, laptops, and S... Sep 25, 2025
Horac Living With MiCAR MiCAR in a nutshell A Regulation That Needs No Invitation The Markets in Crypto-Assets Regulation (MiCAR) already crossed Luxembourg’s doorstep months ago, but it’s still a challenge for many organiza... Sep 4, 2025
Horac Effective IoT Governance The IoT Explosion It usually begins innocently. Someone installs a “smart” coffee machine in the breakroom, another person connects a smartwatch to the corporate Wi-Fi, and suddenly your company netwo... Aug 28, 2025
Horac A small business guide to compliance Why Small Businesses Can’t Ignore Compliance and Risk Management Many small and medium-sized enterprises (SMEs) still cling to the idea that cyber threats and strict regulations are only a problem for... Aug 13, 2025
Horac Project Management Meets Cybersecurity Why Project Management Matters There was a time when project management meant keeping deadlines straight and making sure budgets didn’t mysteriously evaporate halfway through. Those days are long gone... Aug 8, 2025
Horac How to Write Cybersecurity Policies Employees Actually Follow Why Cybersecurity Policies Fail in Practice Most companies aren’t short on cybersecurity policies — they’re short on policies people actually follow. Somewhere between the legal team’s caution and IT’... Jul 31, 2025