We continue our series devoted to discussing issues related to cybersecurity. This time, we share practical conclusions on the implementation of DORA.
Continuing our discussion on cybersecurity-related issues, this time we discuss matters related to risk management in the area of ICT.
Cybersecurity in the area of payments is a key element in protecting data and internal systems against the threat of cyberattacks.
The AI Act has been published – thus, its entry into force is approaching rapidly. As a rule, the entire set of provisions will become applicable on 2 August 2026. However, some regulations, in particular the provisions establishing prohibited practices in the field of artificial intelligence, will come into force earlier – as of 2 February 2025.
Academic studies on aspects of blockchain technology often use complicated technical phrases such as – to name the most important ones – distributed network, decentralized network, DLT (distributed ledger technology), consensus algorithm, PoW (proof of work) or PoS (proof of stake). For this reason, it often remains a complicated, even incomprehensible part of the world of new technologies. In this article I will try to answer the question in an accessible way – what is blockchain?