<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Compliance on BSG Blog — Cybersecurity Insights</title><link>https://bsg.tech/blog/tags/compliance/</link><description>Recent content in Compliance on BSG Blog — Cybersecurity Insights</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 23 Nov 2025 14:36:33 +0000</lastBuildDate><atom:link href="https://bsg.tech/blog/tags/compliance/index.xml" rel="self" type="application/rss+xml"/><item><title>EU Radio Equipment Directive 2025: RED &amp; EN 18031 Guide</title><link>https://bsg.tech/blog/eu-radio-equipment-cybersecurity-red-en-18031-compliance-2025/</link><pubDate>Sun, 23 Nov 2025 14:36:33 +0000</pubDate><guid>https://bsg.tech/blog/eu-radio-equipment-cybersecurity-red-en-18031-compliance-2025/</guid><description>&lt;p&gt;From 2025, the European Union is raising the bar for cybersecurity in every connected device that uses radio technologies. If your product communicates via Wi-Fi, Bluetooth, cellular, Zigbee, LoRa, or any other radio interface, its path to the EU market now runs through a new compliance regime: &lt;strong&gt;RED cybersecurity requirements&lt;/strong&gt;, the &lt;strong&gt;EN 18031 harmonised standards&lt;/strong&gt;, and the &lt;strong&gt;Delegated Regulation (EU) 2022/30&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>TLPT: Threat Led Penetration Testing Explained</title><link>https://bsg.tech/blog/tlpt-threat-led-penetration-testing-explained/</link><pubDate>Fri, 20 Jun 2025 10:00:00 +0000</pubDate><guid>https://bsg.tech/blog/tlpt-threat-led-penetration-testing-explained/</guid><description>&lt;p&gt;&lt;strong&gt;Threat Led Penetration Testing (TLPT)&lt;/strong&gt;, also known as &lt;strong&gt;threat-led pentesting&lt;/strong&gt;, is the gold standard for realistic &lt;a href="https://bsg.tech/blog/cyber-security/"&gt;cybersecurity&lt;/a&gt; validation. TLPT combines the latest &lt;strong&gt;threat intelligence&lt;/strong&gt;, &lt;strong&gt;red teaming tactics&lt;/strong&gt;, and &lt;strong&gt;business risk analysis&lt;/strong&gt; to simulate attacks that your organization is most likely to face. Unlike generic pentesting, TLPT tests not just your systems for vulnerabilities, but also your ability to &lt;strong&gt;detect, respond to, and contain&lt;/strong&gt; those attacks in real time.&lt;/p&gt;</description></item><item><title>EUVD Database: Europe’s CVE Alternative Explained | BSG</title><link>https://bsg.tech/blog/euvd-europes-answer-to-cve-instability/</link><pubDate>Wed, 14 May 2025 11:11:06 +0000</pubDate><guid>https://bsg.tech/blog/euvd-europes-answer-to-cve-instability/</guid><description>&lt;p&gt;As the MITRE-run CVE program faces operational challenges, Europe has quietly launched a significant alternative. The &lt;strong&gt;European Vulnerability Database (EUVD)&lt;/strong&gt;, developed by ENISA, officially went live in April 2025.&lt;/p&gt;
&lt;p&gt;Though some viewed it as a reaction to MITRE’s instability, the EUVD was long in the making. Its creation was mandated under the &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555"&gt;&lt;strong&gt;NIS2 Directive&lt;/strong&gt;&lt;/a&gt; (Articles 62–63), adopted in 2022, which required ENISA to develop a vulnerability database serving the EU digital ecosystem.&lt;/p&gt;</description></item><item><title>CVE Under Threat: What You Need to Know</title><link>https://bsg.tech/blog/cve-under-threat-what-you-need-to-know/</link><pubDate>Wed, 16 Apr 2025 17:01:36 +0000</pubDate><guid>https://bsg.tech/blog/cve-under-threat-what-you-need-to-know/</guid><description>&lt;p&gt;The &lt;strong&gt;Common Vulnerabilities and Exposures (CVE)&lt;/strong&gt; program is one of the most critical pillars of modern cybersecurity. Without it, organizations around the world would struggle to identify, track, and prioritize vulnerabilities in software and hardware. But as of &lt;strong&gt;April 16, 2025&lt;/strong&gt;, this essential system is facing a major disruption: the expiration of MITRE’s federal contract to operate the CVE program. Here’s what’s happening—and why you should care.&lt;/p&gt;</description></item><item><title>2024 EU Cybersecurity Insights</title><link>https://bsg.tech/blog/2024-eu-cybersecurity-insights-key-findings-trends-and-recommendations/</link><pubDate>Mon, 09 Dec 2024 11:55:52 +0000</pubDate><guid>https://bsg.tech/blog/2024-eu-cybersecurity-insights-key-findings-trends-and-recommendations/</guid><description>&lt;p&gt;The &lt;a href="https://www.enisa.europa.eu/publications/2024-report-on-the-state-of-the-cybersecurity-in-the-union"&gt;2024 EU Cybersecurity Report&lt;/a&gt; provides a detailed overview of the Union’s digital security challenges, key areas for improvement, and actionable strategies for stakeholders. As threats grow in complexity, this report highlights critical findings, emerging trends, and strategic recommendations to bolster the EU’s cybersecurity posture.&lt;/p&gt;</description></item><item><title>Enhancing Cybersecurity to Align with NIS2 Directive</title><link>https://bsg.tech/blog/strengthening-cybersecurity-practices-in-compliance-with-the-nis2-directive/</link><pubDate>Mon, 02 Dec 2024 16:11:58 +0000</pubDate><guid>https://bsg.tech/blog/strengthening-cybersecurity-practices-in-compliance-with-the-nis2-directive/</guid><description>&lt;p&gt;The European Union’s NIS2 Directive, reinforced by ENISA’s 2024 Implementation Guidance, sets a comprehensive standard for [&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;cybersecurity&lt;/a&gt;](&lt;a href="https://bsg.tech/cyber-security/"&gt;https://bsg.tech/cyber-security/&lt;/a&gt;) across critical and digital service providers. For business leaders, adopting these practices ensures regulatory compliance and builds organizational resilience.&lt;/p&gt;
&lt;h2 id="understanding-the-nis2-directive-and-enisas-guidance"&gt;Understanding the NIS2 Directive and ENISA’s Guidance&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/raising-awareness-campaigns/network-and-information-systems-directive-2-nis2"&gt;NIS2 Directive&lt;/a&gt; mandates robust cybersecurity measures for entities across sectors such as cloud computing and online platforms. &lt;a href="https://www.enisa.europa.eu/publications/implementation-guidance-on-nis-2-security-measures"&gt;ENISA’s guidance&lt;/a&gt; provides actionable steps to implement these measures effectively, emphasizing risk management, incident handling, and supply chain security.&lt;/p&gt;</description></item><item><title>Empowering Cybersecurity Governance: NCSC’s Board Toolkit</title><link>https://bsg.tech/blog/empowering-cybersecurity-governance-ncscs-board-toolkit/</link><pubDate>Sun, 01 Dec 2024 12:07:28 +0000</pubDate><guid>https://bsg.tech/blog/empowering-cybersecurity-governance-ncscs-board-toolkit/</guid><description>&lt;p&gt;Cybersecurity is no longer just a technical issue; it’s a critical business risk that directly impacts organizational stability, reputation, and financial health. As digital dependency increases, so does exposure to cyber threats, from data breaches to ransomware attacks and supply chain vulnerabilities. For board members, addressing cybersecurity is not optional—it’s essential.&lt;/p&gt;</description></item></channel></rss>