Security & Compliance Resources

Expert guides to help you understand, implement, and maintain web security and regulatory compliance. From OWASP and GDPR to TLS, security headers, vulnerability disclosure, and AI transparency, these resources are built to turn standards into operational action.

OWASP Top 10 2025 Guide

A comprehensive breakdown of the ten most critical web application security risks, with practical remediation steps for SMEs.

Web SecurityVulnerabilitiesBest Practices

NIS2 Compliance Checklist

The 10 mandatory security measures under Article 21 of the NIS2 Directive, with implementation guidance for EU businesses.

EU RegulationComplianceCritical Infrastructure

GDPR Audit Guide

Complete guide to GDPR compliance including the Article 30 processing registry, DPIAs, data subject rights, and CNIL audit preparation.

GDPRPrivacyCNIL

AI Security Risks Guide

Understanding the OWASP LLM Top 10 and the EU AI Act: how to audit AI systems, protect against prompt injection, and ensure regulatory compliance.

AI SecurityLLMEU AI Act

Security Headers Checklist

A practical production baseline for CSP, HSTS, cookie flags, and browser hardening controls that SMEs can maintain over time.

HeadersHardeningProduction Baseline

TLS Certificate Expiry Guide

How to monitor certificate expiry, renew safely, and verify HTTPS across apps, APIs, and forgotten subdomains.

TLSMonitoringReliability

security.txt Guide

Publish a trustworthy disclosure entry point and connect it to a real vulnerability triage workflow.

DisclosureTrustOperations

EU AI Act Article 50 Guide

A practical guide to AI transparency obligations for chatbots, generated content, and AI-assisted user journeys.

AI GovernanceTransparencyEU AI Act

ISO 27001:2022 Compliance Guide

Complete guide to ISO 27001 Annex A controls, ISMS implementation roadmap, and automated assessment through WarDek security scanning.

ISO 27001ISMSCertification

SOC 2 Type II Compliance Guide

Trust Service Criteria explained for SaaS companies. Type I vs Type II, readiness roadmap, and automated TSC assessment.

SOC 2Trust ServicesSaaS
Tool Comparisons

WarDek vs Other Tools

See how WarDek compares to popular security scanners. Fair, detailed comparisons to help you choose the right tool.