‘Regular’ in the TISAX context: A guide for companies and consultants
This article examines the meaning and interpretation of the term ‘regular’ in the TISAX® context.
The role of internal ISMS on-site audits
I will discuss the importance of on-site audits and explain why they are essential to the integrity and effectiveness of the audit process.
Critical Infrastructure: Drone Identification Systems
The recent incident in Brunsbüttel, where drones were repeatedly sighted over one of the largest chemical parks in Schleswig-Holstein…
Update 2024: Which laws are particularly relevant in the context of information security?
An updated overview of laws and some contractual requirements that can/should influence the policies in an ISMS.
(Draft) Information Security Guideline
Global Information Security Policy: Clear guidelines and flexible implementation for maximum security and efficiency.
VDA ISA: Must and Should Requirements
Must requirements are mandatory, while should requirements have to be implemented unless there are good reasons against it.
How you can immediately shed light on the shadow IT of web services
Microsoft Cloud App Security can secure the use of external web services through comprehensive risk assessments and compliance controls.
ISMS Scoping
In this article, I will discuss ISMS scoping in accordance with ISO 27001, TISAX® and KRITIS.
TISAX® vs. ISO 27001: A comparison of the rating of non-conformities
Differences and similarities in the evaluation of major and minor non-conformities in the TISAX® assessment and ISO 27001 audit...
What are the ISMS resource requirements?
Have you been told that an ISMS can be implemented quickly? Click here...