Endpoint Cybersecurity GmbH
- Delivering often in small increments with Scrum
- Navigating AI Standards and Regulations
- Policy vs Standard vs Procedure: why, what, how
- Comparing Annex A in ISO/IEC 27001:2013 vs. ISO/IEC 27001:2022
- NIS2 Fulfillment through TISAX Assessment and ISA6
- Guide for delivering frequently software features that matter (series) #2/2: Challenges and the path forward
- Guide for delivering frequently software features that matter (series) #1/2: the Pillars of successful frequent delivery
- Guide for delivering frequently software features that matter (series)
- Beyond “Move Fast and Fail Fast”: Balancing Speed, Security, and … Sanity in Software Development (with Podcast)
- Project management with Scrum (with Podcast)



Comparing “Records of Processing Activities” (ROPA) and “Data Protection Impact Assessments” (DPIA) (with Podcast)
/in EducationalUnderstanding ROPA and DPIA: Key GDPR Concepts for Tech Companies Podcast of this article: https://www.sorinmustaca.com/wp-content/uploads/2025/02/ROPA-DPIA_Chapter_0.mp3 Contents Toggle Understanding ROPA and DPIA: Key GDPR Concepts for Tech Companies Records of Processing Activities (ROPA): Your Company’s Data Map Data Protection Impact Assessments (DPIA): Proactive Risk Management ROPA and DPIA: Similarities and Differences Let’s explore […]
AI vs. (secure) software developers
/in EducationalI think the entire software development world saw NVIDIA’s CEO saying that the world will stop needing software developers, because they will be replaced by AI. Well, considering that this comes from the guy who sells the core on which AI is built, is understandable. But is there any truth to this? Let’s look at […]
Accelerating feature delivery in software development
/in EducationalMy company develops security products for all major operating systems. We work with startups and with big companies, all striving to develop features (functional and non-functional) as fast and as good as possible. While on the first view this seems like a contradiction, there are actually ways of implementing exactly this. For security software development […]
How-To create Security User Stories
/in EducationalIn the previous article, we explored how Scrum enables teams to add security to the backlog and prioritize it based on risk. Incorporating security into the SDLC ensures that security is not an afterthought but an integral part of the development process. Security User Stories are specific, actionable items that articulate the security needs of […]
Delivering secure software in an agile way
/in EducationalContents Toggle Agile Software Development: Why It’s Better Using Scrum for software development Non-Functional features in Scrum Security in Software Development The challenge of adding security user stories to the backlog How to add security to the Scrum backlog Conclusions Agile Software Development: Why It’s Better Traditional development methodologies, such as the Waterfall model, […]