Logo YesWeHack
Blog
LoginContact Us

Best Practices

  1. Blog
  2. Best Practices
Futuristic Sci-Fi glowing HUD clock fading, representing how the clock is now ticking on Cyber Resilience Act compliance

Clock ticking on Cyber Resilience Act compliance, Bug Bounty forecasts, intriguing CISA red team find – OffSec roundup for CISOs

Read More ->
The clock for compliance with the EU Cyber Resilience Act has now started ticking

Cyber Resilience Act: compliance countdown set to start for EU law focused on eliminating vulnerabilities

Read More ->
Attack surface discovery illustrated with nodes that represent attack vectors and text that reads: ‘mapping your attack vectors’

Attack surface discovery: mapping your exposed vectors with continuous threat exposure management (CTEM series #1)

Read More ->
EU flag signifies NIS 2 entering into force and the Cyber Resilience Act being adopted

NIS 2 in force, Cyber Resilience Act adopted, CISA hails VDP impact – OffSec roundup for CISOs

Read More ->
YesWeHack vulnerability triage chief Adrien Jeanneau on the art of triaging bug bounty vulnerability reports in this YesWeHack interview

‘Happy hunters equal happy customers and vice versa’: YesWeHack vulnerability triage chief Adrien Jeanneau on creating a virtuous Bug Bounty circle

Read More ->
Servers with mess of wires plugged in in an example of tech sprawl

Tackling tech sprawl, CISO burnout, NIS 2 now enforceable – OffSec roundup for CISOs

Read More ->
EU flag signifies NIS 2 entering into force and the Cyber Resilience Act being adopted

NIS 2 in force, Cyber Resilience Act adopted, CISA hails VDP impact – OffSec roundup for CISOs

EU flag on parliament building with text on left side of image: "NIS 2 Enters into force"

The NIS 2 Directive is now enforceable: What are the implications for vulnerability management?

Read More ->
The Windows blue screen of death took down an estimated 8.5 million Windows machines following a botched CrowdStrike software update.

Partial SolarWinds reprieve, CrowdStrike lessons, LLM kryptonite – OffSec roundup for CISOs

Read More ->
EU flags

NIS 2 in brief, security tech hype cycle, Italy’s first ever live Bug Bounty – OffSec roundup for CISOs

Read More ->
EU flag on parliament building with text on left side of image: "NIS 2 Enters into force"

The NIS 2 Directive is now enforceable: What are the implications for vulnerability management?

Apple declines to pay Kaspersky vuln reward, Bug Bounty ‘extortion’ dispute, Microsoft Recall backlash – OffSec roundup for CISOs

Read More ->

Countdown to NIS 2 compliance: Key insights and implications for your SecOps strategy

Read More ->
Man wearing black smart watch

UK PSTI Act: ‘World first’ IoT security rules offer reminder of VDP virtues

Read More ->

Apple declines to pay Kaspersky vuln reward, Bug Bounty ‘extortion’ dispute, Microsoft Recall backlash – OffSec roundup for CISOs

Previous
2/5
12345
Next

Footer

Logo YesWeHack
Logo YesWeHack

Products

  • Bug Bounty
  • Continuous Pentesting
  • Vulnerability Disclosure Policy
  • Pentest Management
  • Attack Surface Management
  • Live Hacking Events

Researchers

  • Start Hunting
  • Public Programs
  • Tools
  • Ranking
  • Dojo

Resources

  • Blog
  • Case Studies
  • Videos
  • Help Center
  • API
  • Github
  • Newsletter

Company

  • About YesWeHack
  • Trust & Security
  • Career
  • Press
  • Events
  • Contact

Follow us

Linkedin White
Twitter Logo
Youtube White
GitHub, YesWeHack

©2025 YESWEHACK

  • Legal Notices
  • Privacy Policy
  • Cookies Policy
  • Change Cookie Preferences