Endpoint Cybersecurity GmbH
- Navigating AI Standards and Regulations
- Policy vs Standard vs Procedure: why, what, how
- Comparing Annex A in ISO/IEC 27001:2013 vs. ISO/IEC 27001:2022
- NIS2 Fulfillment through TISAX Assessment and ISA6
- Guide for delivering frequently software features that matter (series) #2/2: Challenges and the path forward
- Guide for delivering frequently software features that matter (series) #1/2: the Pillars of successful frequent delivery
- Guide for delivering frequently software features that matter (series)
- Beyond “Move Fast and Fail Fast”: Balancing Speed, Security, and … Sanity in Software Development (with Podcast)
- Project management with Scrum (with Podcast)
- Comparing “Records of Processing Activities” (ROPA) and “Data Protection Impact Assessments” (DPIA) (with Podcast)



Why companies producing security software need 3rd party help in adding additional security technologies
/in PostIf you produce some security software (Anti-malware, Anti-ransomware, URL Filter, etc.) you should never count only on one source of knowledge to deliver your product’s value to the customers. Many companies think that this is their core competence and they refuse to look into other directions. This is fundamentally wrong, even if you are a […]
How to make sure your product’s reputation is good
/in ServicesIf your product is already on the market, or if you just want to release it, you need to ensure that it has a good reputation. Balancing features that improve monetization with criteria that lower the product’s reputation is not an easy task. For this you need a partner with experience in Product and Project […]
Attending Virus Bulletin Conference in Prague
/in PostI will be representing my company Endpoint Cybersecurity GmbH in attending the Virus Bulletin Conference in Prague between 27.9 and 1.10. If you want an appointment, please Contact Us.
One year later: challenges for young anti-malware products today (presentation Virus Bulletin 2020)
/in PostDownloads Download slides (PDF) A year ago, at VB2019 we presented for the first time an overview of how the anti-malware world looks from the perspective of a young company trying to enter the market: how they try to build products, how they try to enter the market, how they try to convert users, […]
Challenges for young anti-malware products today (presentation Virus Bulletin 2019)
/in Posthttps://www.virusbulletin.com/conference/vb2019/abstracts/challenges-young-anti-malware-products-today Sorin Mustaca (Sorin Mustaca IT Security Consulting) Download the slides: https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-Mustaca.pdf There are two categories of anti-malware vendors: Established anti-malware vendors, who are preoccupied with getting the best scores in detection tests and capturing more market share. Emerging anti-malware vendors, who are trying to understand what they need to do in order to enter the […]