Notes (alphabetical)
Search to quickly find notes, articles, guides, and resources across the site.
Search to quickly find notes, articles, guides, and resources across the site.
DeepSeek is a company that develops open-source artificial intelligence large language models. Further reading Incentivizing Reasoning Capability in LLMs via Reinforcement Learning - Deepseek-AI (PDF) Deepseek - Wikipedia
The EU Digital Operational Resilience Act (DORA) aims to ensure the resilience of digital services in the financial sector and prevent and mitigate cyber threats. Further reading Digital finance: Council adopts Digital Operational Resilience Act | European Council Operational Resilience: It’s a global issue | The International Banker Operational resilience in the UK, EU and US: A comparison | White and Case Operational Resilience | Herbert Smith Freehills Principles for Operational Resilience | BIS The EU’s Digital Operational Resilience Act for financial services | Deloitte Introducing the Digital Operational Resilience Act | PwC Related pages Operational Resilience OR-2 | HKMA
A durable medium allows customers to store information personally addressed to them in a way that is accessible for future reference. Further reading Guidance on Durable Medium (FCA) Definition of Durable Medium (FCA Handbook) The FCA issue guidance on the outdated definition of ‘durable medium’ (Lexology); June 2017
Dynamic Application Security Testing (DAST) is a security testing method that analyses a running application from the outside to identify vulnerabilities by simulating real-world attacks.
Elasticity in the cloud refers to the ability to dynamically scale computing resources up or down in response to demand, optimising both performance and cost.
To be properly classified as an assurance engagement, there must be five elements in place: A three-party relationship Subject matter Suitable criteria Sufficient appropiate evidence An assurance report Further reading The five elements of an assurance engagement
Encryption is the process of scrambling data to make it unreadable to unauthorised individuals in order to protect its confidentiality. Technically, this involves using an algorithm and a cryptographic key to transform the original plaintext (readable data) into ciphertext (unreadable data). Only individuals who possess the corresponding decryption key can reverse this process and restore the data to its original readable form. Further reading The Code Book, by Simon Singh
Further reading Qualys Expands IT Control Posture To ‘De-Risk’ Business - Forbes Related pages Qualys
Further reading What Is ESG Investing? - Investopedia
The European Banking Authority (EBA) is an independent European Union (EU) authority tasked with ensuring effective and consistent prudential regulation and supervision across the European banking sector. Further reading European Banking Authority (eba) Interactive Single Rulebook
Maintaining the ability to carry stuff through your lifetime is essential to maintaining your healthspan. In this short clip, Peter Attia explains the benefits of the Farmer’s Carry as a yardstick (and training method) to ensure you don’t lose that ability. Start early! Peter Attia explains that a woman in her 40s should be able to carry 75% of her bodyweight in her hands for 1 minute
What Is FIDO2 Authentication? FIDO2 authentication is a passwordless login method that uses public-key cryptography to securely verify a user’s identity. Developed by the FIDO Alliance and W3C, it offers a safer, more convenient alternative to traditional passwords. The term FIDO in FIDO2 stands for Fast Identity Online. The “2” indicates the second generation of the standard. Types of FIDO2 Authentication: Hardware-Based Authentication: Uses dedicated physical devices to verify identity. Security Keys: External devices that connect via USB, NFC, or Bluetooth. Examples are the YubiKey and the Google Titan security key. ...