<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security Strategy on BSG Blog — Cybersecurity Insights</title><link>https://bsg.tech/blog/categories/security-strategy/</link><description>Recent content in Security Strategy on BSG Blog — Cybersecurity Insights</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 30 Mar 2026 09:00:00 +0000</lastBuildDate><atom:link href="https://bsg.tech/blog/categories/security-strategy/index.xml" rel="self" type="application/rss+xml"/><item><title>What Makes a Boutique Cybersecurity Firm Different?</title><link>https://bsg.tech/blog/what-makes-a-boutique-cybersecurity-firm-different/</link><pubDate>Mon, 30 Mar 2026 09:00:00 +0000</pubDate><guid>https://bsg.tech/blog/what-makes-a-boutique-cybersecurity-firm-different/</guid><description>&lt;p&gt;Here&amp;rsquo;s something most security buyers learn the hard way: the firm you hire and the people who do the work are often not the same.&lt;/p&gt;
&lt;p&gt;At large consultancies, a senior partner sells the engagement. A project manager scopes it. Then the actual testing gets handed to whoever is available — often a junior analyst running automated scans and filling in report templates. You pay for brand recognition, not expertise.&lt;/p&gt;</description></item><item><title>Small Business Cybersecurity: Essential Checklist</title><link>https://bsg.tech/blog/small-business-cyber-security-checklist/</link><pubDate>Fri, 16 Jan 2026 16:07:54 +0000</pubDate><guid>https://bsg.tech/blog/small-business-cyber-security-checklist/</guid><description>&lt;p&gt;These cyber security for small business recommendations focus on the conventional Small and Medium Enterprise organizations. This text does not cover startup specifics or the &lt;a href="https://bsg.tech/blog/application-security/"&gt;application security&lt;/a&gt; needs of software development companies. This is just a checklist of the most crucial cyber security measures every small business owner can and must implement.&lt;/p&gt;</description></item><item><title>EU Radio Equipment Directive 2025: RED &amp; EN 18031 Guide</title><link>https://bsg.tech/blog/eu-radio-equipment-cybersecurity-red-en-18031-compliance-2025/</link><pubDate>Sun, 23 Nov 2025 14:36:33 +0000</pubDate><guid>https://bsg.tech/blog/eu-radio-equipment-cybersecurity-red-en-18031-compliance-2025/</guid><description>&lt;p&gt;From 2025, the European Union is raising the bar for cybersecurity in every connected device that uses radio technologies. If your product communicates via Wi-Fi, Bluetooth, cellular, Zigbee, LoRa, or any other radio interface, its path to the EU market now runs through a new compliance regime: &lt;strong&gt;RED cybersecurity requirements&lt;/strong&gt;, the &lt;strong&gt;EN 18031 harmonised standards&lt;/strong&gt;, and the &lt;strong&gt;Delegated Regulation (EU) 2022/30&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>End-to-End Encrypted Messaging: Why It Matters in 2026</title><link>https://bsg.tech/blog/end-to-end-encrypted-messaging/</link><pubDate>Fri, 06 Dec 2024 21:10:51 +0000</pubDate><guid>https://bsg.tech/blog/end-to-end-encrypted-messaging/</guid><description>&lt;p&gt;As cyber threats evolve, secure communication is becoming a cornerstone of both personal privacy and organizational &lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security&lt;/a&gt;. In late 2024, the &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a"&gt;FBI and CISA explicitly urged Americans to use encrypted messaging apps&lt;/a&gt; after the Salt Typhoon campaign compromised major U.S. telecommunications providers, exposing real-time calls and text messages to Chinese intelligence. Their message was clear: &lt;strong&gt;if your communications aren’t encrypted, they’re vulnerable.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Enhancing Cybersecurity to Align with NIS2 Directive</title><link>https://bsg.tech/blog/strengthening-cybersecurity-practices-in-compliance-with-the-nis2-directive/</link><pubDate>Mon, 02 Dec 2024 16:11:58 +0000</pubDate><guid>https://bsg.tech/blog/strengthening-cybersecurity-practices-in-compliance-with-the-nis2-directive/</guid><description>&lt;p&gt;The European Union’s NIS2 Directive, reinforced by ENISA’s 2024 Implementation Guidance, sets a comprehensive standard for [&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;cybersecurity&lt;/a&gt;](&lt;a href="https://bsg.tech/cyber-security/"&gt;https://bsg.tech/cyber-security/&lt;/a&gt;) across critical and digital service providers. For business leaders, adopting these practices ensures regulatory compliance and builds organizational resilience.&lt;/p&gt;
&lt;h2 id="understanding-the-nis2-directive-and-enisas-guidance"&gt;Understanding the NIS2 Directive and ENISA’s Guidance&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/raising-awareness-campaigns/network-and-information-systems-directive-2-nis2"&gt;NIS2 Directive&lt;/a&gt; mandates robust cybersecurity measures for entities across sectors such as cloud computing and online platforms. &lt;a href="https://www.enisa.europa.eu/publications/implementation-guidance-on-nis-2-security-measures"&gt;ENISA’s guidance&lt;/a&gt; provides actionable steps to implement these measures effectively, emphasizing risk management, incident handling, and supply chain security.&lt;/p&gt;</description></item><item><title>Empowering Cybersecurity Governance: NCSC’s Board Toolkit</title><link>https://bsg.tech/blog/empowering-cybersecurity-governance-ncscs-board-toolkit/</link><pubDate>Sun, 01 Dec 2024 12:07:28 +0000</pubDate><guid>https://bsg.tech/blog/empowering-cybersecurity-governance-ncscs-board-toolkit/</guid><description>&lt;p&gt;Cybersecurity is no longer just a technical issue; it’s a critical business risk that directly impacts organizational stability, reputation, and financial health. As digital dependency increases, so does exposure to cyber threats, from data breaches to ransomware attacks and supply chain vulnerabilities. For board members, addressing cybersecurity is not optional—it’s essential.&lt;/p&gt;</description></item><item><title>How to Show Return on Cyber Security Investment</title><link>https://bsg.tech/blog/security-return-on-investment/</link><pubDate>Thu, 28 Dec 2023 12:00:00 +0000</pubDate><guid>https://bsg.tech/blog/security-return-on-investment/</guid><description>&lt;p&gt;Demonstrating your return on cyber&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security investment&lt;/a&gt; to investors, boards, and top managers is one of the hardest challenges a CISO faces. Yet ROSI (Return on Security Investment) has become a non-negotiable KPI — especially since the &lt;a href="https://www.sec.gov/rules-regulations/2023/07/s7-09-22"&gt;SEC’s 2023 cybersecurity disclosure rules&lt;/a&gt; now require public companies to report board oversight of cyber risk.&lt;/p&gt;</description></item><item><title>10 Steps to Protect Your Small Business from Cyber Attacks</title><link>https://bsg.tech/blog/10-steps-to-protect-business-from-cyberattacks/</link><pubDate>Wed, 26 May 2021 18:37:12 +0000</pubDate><guid>https://bsg.tech/blog/10-steps-to-protect-business-from-cyberattacks/</guid><description>&lt;p&gt;Small businesses often assume they are too insignificant to be targeted by cyberattacks, but the truth is starkly different. In fact, &lt;strong&gt;81% of cybersecurity breaches affect small and medium-sized businesses (SMBs)&lt;/strong&gt;. Cybercriminals see these companies as easier targets because they usually lack the robust defenses that larger organizations have in place. Many SMBs hold sensitive customer data, payment information, and proprietary details, making them attractive to attackers. Without strong cybersecurity measures, these businesses face a higher risk of data breaches, ransomware attacks, and financial loss. Recognizing these threats and taking proactive steps is essential for protection.&lt;/p&gt;</description></item><item><title>The Difference Between Organization and Product Security</title><link>https://bsg.tech/blog/the-difference-between-organization-and-product-security/</link><pubDate>Sat, 13 Jul 2019 18:41:39 +0000</pubDate><guid>https://bsg.tech/blog/the-difference-between-organization-and-product-security/</guid><description>&lt;p&gt;Among Ukrainian organization, we get the most requests from IT companies, and in this post, I want to talk about some accumulated experience. Quite possibly, it will be useful to other organizations in this business, and maybe organizations from different sectors. So if you know a CIO/CTO from an IT-firm, show them this text. It was written for them.&lt;/p&gt;</description></item></channel></rss>