About cyber-laws.com
This blog is co-run by Andrei (Cybersecurity Engineer) and Valeria (Law Student). We bridge the gap between technology and regulation by tracking how security practices meet legal obligations across the EU and beyond. Our goal is to transform dense regulations into practical guidance that engineers, lawyers, founders, and compliance teams can actually use.
Why we built this: the cybersecurity legal landscape is changing fast (NIS2, DORA, CRA, GDPR, eIDAS, and more). Teams often struggle to translate high-level texts into day‑to‑day controls, architectures, and processes. Here, we summarize the essentials, highlight what really changes for organizations, and point to authoritative sources.
Editorial principles
- Accuracy first: we cite primary sources (EUR‑Lex, ENISA, official guidance).
- Actionable: we connect legal requirements to security controls and workflows.
- Neutral and concise: no hype, just what matters for implementation.
- Kept current: we revise posts as standards and guidance evolve.
What you’ll find
- Plain-language explainers of new and existing EU cybersecurity rules
- Checklists and mappings to frameworks (NIST CSF, ISO/IEC 27001, OWASP)
- Developer- and auditor-friendly interpretations with concrete examples
- Links to official texts on EUR‑Lex and guidance from ENISA and other bodies
Who this is for: security practitioners, product teams, GRC, and legal professionals who need clarity quickly. We focus on what’s actionable, cite primary sources, and keep content current as guidance evolves.
Get in touch
If you have suggestions, spot something to improve, or just want to connect: