top of page


Offensive Cyber-AI: How AI-Powered Attacks Change The Rules Of The Game – And How To Prepare
Introduction: Offensive AI Has Entered The Cyber Arena Offensive artificial intelligence is no longer science fiction. It is already transforming how cyber-attacks are planned, launched and scaled – and forcing organisations to rethink their entire security posture. In this article, we explain what “offensive cyber‑AI” really means, why it changes the rules for defenders, and how you can prepare your organisation with a pragmatic, business‑driven roadmap. We will also show ho
Dec 29, 2025


EU Cloud Sovereignty After NIS2: What Comes Next for Cloud Providers and Users?
Cloud sovereignty in Europe is entering a new phase. After the NIS2 Directive came into force in October 2024, many organisations are asking what the next big step will be – sometimes dubbed, a bit loosely, the “EU Cloud Sovereignty Act”. While no single law with that title exists today, the EU is clearly building a de facto cloud sovereignty framework through NIS2, the Data Act , forthcoming Cloud & AI Development Act , the Cloud Sovereignty Framework and the EU Cybersecu
Dec 29, 2025


From NIS2 Compliance To End‑To‑End Zero‑Trust: Building A Full ZTNA 2.0 Architecture
Introduction: NIS2 Is Just The Beginning NIS2 changes the rules of the game. Across Europe, the new NIS2 Directive is forcing organisations to strengthen their security posture, rethink risk management and prove cyber resilience. But aligning with NIS2 requirements is not enough on its own: real resilience comes from moving towards a comprehensive Zero‑Trust architecture , powered by modern ZTNA 2.0 approaches. In this article, we explain how to move post‑NIS2 from complian
Dec 8, 2025


Quantum-Safe Energy: The Impact of Post-Quantum Cybersecurity on Critical IT and Power Infrastructures
Introduction: Why Quantum-Safe Cybersecurity Matters Now Quantum is no longer science fiction for cybersecurity. As quantum computing progresses, today’s public-key cryptography – the backbone of VPNs, TLS, digital certificates, smart grid communications and remote operations – will eventually become vulnerable. Critical infrastructures such as power grids, data centers and industrial facilities are particularly exposed, because their assets are designed to last decades and c
Dec 8, 2025


How to accelerate energy, IT and cybersecurity convergence
Accelerate the convergence between energy, IT and cybersecurity. This article shows how to move from siloed programs to an integrated operating model that cuts energy waste, improves uptime, and strengthens your cyber posture. At Score Group, we integrate energy, digital infrastructure and new technologies to help organizations execute this convergence at pace. Through our Noor divisions — Noor Energy, Noor ITS and Noor Technology — we design and implement end‑to‑end solution
Nov 17, 2025


Hybrid cloud and digital sovereignty for EU compliance
Hybrid cloud and digital sovereignty are the twin pillars of EU-ready IT. This article explains how to design, operate, and govern a hybrid architecture that meets European requirements while keeping control over data, workloads, and suppliers. In brief Build a hybrid model that keeps sensitive data and keys in EU-controlled environments while using public cloud for elastic workloads. Align with GDPR, NIS2, Schrems II, the EU Data Act, and emerging EU cloud certification to
Oct 29, 2025


Cybersecurity and AI: LPUs power proactive defense
Cybersecurity and AI: when LPUs become the brain of proactive defense. This article explains how Language Processing Units (LPUs) enable real-time detection, response and resilience—so security teams can shift from reactive alert fatigue to predictive, automated defense. At a glance LPUs deliver ultra‑low‑latency AI inference, ideal for inline detection, triage, and autonomous response at scale. Proactive defense hinges on fast, explainable decisions across logs, network tr
Oct 29, 2025
bottom of page
