null

Firewall

Firewall as the foundation of security. How to choose the right NGFW for your organization’s needs?

null

AI

Phishing, deepfakes, and attack automation: how AI is reshaping the threat landscape

AI kontra krytyczne myślenie

SOC

AI vs. critical thinking in cybersecurity. Reflections from a SOC specialist

Podatności w sieci

Exposure Management

Hostile IT environments: how cybercriminals hunt for vulnerabilities across networks

Ataki na tożsamość użytkowników

SOC

The rise in popularity of Microsoft Office and attacks on user identities

null

Strategy

What makes vulnerability management difficult? Key challenges

Twoja firma została zaatakowana przez grupę ransomware – co teraz? Plan działania

Strategy

Your Company Has Been Attacked by a Ransomware Group – What Now? An Action Plan

EDR nie jest nieomylny – techniki obchodzenia mechanizmów detekcji

EDR

EDR Is Not Infallible – Techniques for Bypassing Detection Mechanisms

EDR czy antywirus? Co wybrać dla swojej organizacji

EDR

EDR or Antivirus? What should you choose for your organization

KSC i DORa

NIS2

KSC and DORA in practice: challenges, technologies, and processes

Threat hunting

Strategy

Threat Hunting – a proactive cybersecurity strategy for organizations

Co to jest SOC? Główne obszary działania i technologie

SOC

What Is SOC? Key areas of operation and technologies

The attack on your company could have started a month ago.

Check how you can secure your organization today.