Resources

Blog & Community
Six components of the LöhnMethode

The LöhnApp: A digital tool to increase efficiency

The LöhnMethod is your key to holistic success – professionally and privately. More than a calendar system, it offers a...

Protective shield with a keyhole and stars

Digital Operational Resilience Act (DORA): Comprehensive Checklist for Companies

Mrs Wittman is a lawyer in Munich and a partner at Bitsea. To enhance digital operational resilience, the EU Commission...

Red shield with keyhole and stars

NIS2 Preparation Checklist for Open Source Software

As the implementation deadline for the revised Network and Information Systems Directive (NIS2) approaches, companies across the EU need to...

Bisquat2

Bisquat2: What is hiding there?

Today, we are shedding light on a topic that is still all too readily overlooked as the “little sister of...

Legoman half open

The Cyber Resilience Act (CRA) and the Management of Open Source

Open source is everywhere: Hardly any product today can do without digital components, from electric toothbrushes and baby monitors to...

Shield with company icon

Quickstart:NIS2-Directive

What is the NIS2 Directive? The NIS2 Directive, or the Directive on Security of Network and Information Systems, is a...

Cityview

The truth is in the source code: Bisquat2!

„No one in the brief history of computing has ever written a piece of perfect software. It’s unlikely that you’ll...

Protective shield with a keyhole and stars

Quickstart: CRA (Cyber Resilience Act)

What is Cyber Resilience Act?   The European Cyber Resilience Act (CRA) aims to set the boundary conditions for the...

Red shield with keyhole and stars

Know Your Systems: DORA forces you to!

Open source in focus: Dora, vulnerabilities and the security of the software supply chain In a world where open source...

1 2 3 4 5