EN

Uncategorized

Cybercrime – what’s at stake?

Read More

The Cybercriminal market gives many ways to earn money. With technology becoming widespread, traditional offline crimes tend to shift into online spaces. Cybercriminals include both buyers and sellers. They gather to perform transactions of data. Products divide into three broad categories: Read More

Welcoming DORA… another star on the stage of compliance!

Read More

The Digital Operational Resilience Act (DORA) is a regulation that aims to strengthen the IT security of financial entities such as banks, insurance companies and investment firms in the European Union. The regulation introduces uniform and harmonized governing principles for the management of cyber risks, streamlines reporting on cyber incidents, and supervises third-party risk. Organizations that fail to comply with DORA may face a periodic penalty payment of 1% of the average daily global turnover in the preceding year for up to six months until compliance is achieved. Read More

Most commonly used in phishing attacks…

Read More

In this article, we'll explore trends in documents used in phishing attacks. The purpose of such an attack is to get your login credentials (login + password) to online services. To make it more credible, attackers use websites that imitate well-known services that require password authentication from a third-party service or service (such as Google, Apple, or Facebook). Read More

NIS2 – in anticipation of October 2024…

Read More

The NIS Directive is a step in the right direction for cybersecurity – therefore for our data and the services we use. Because the most important is to start. And to improve, because the NIS directive left quite a few things to be still covered. That is why it was decided to introduce NIS2 – covering a wider range of entities and introducing more stringent security requirements. Read More

SIEM, SOAR, and XDR basics for Security Analysts

Read More

In the ever-evolving landscape of cybersecurity, security analysts face a myriad of challenges. With an increasing number of threats and an overwhelming volume of security data, organizations are turning to advanced technologies to enhance their security operations. This article aims to shed light on the differences between three prominent solutions: SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and XDR (Extended Detection and Response). By understanding these differences, security analysts can make informed decisions about which technology best suits their organization's needs. Read More

Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
Akceptuję More info