Uncategorized
EDR and NDR – efficient protection of IT infrastructure against current threats
Cybersecurity draws in many aspects from military concepts used to combat aggressors on the battlefields. As an example of a military concept […]
What is context cybersecurity and why is it important?
The Oxford Dictionary defines “context” as “the circumstances that form the setting around an event, statement, or idea and through which it […]
How important is the security of mobile devices and why it is a worthy investment?
Nowadays is when mobility forces companies to leave data in the hands of employees. Access restrictions often make companies less competitive, delaying […]
Protect your business by securing your e-mail
Since its introduction, email has been the most common form of office communication, but also a vector for targeted attacks on enterprises. […]
„Zero Trust Network” – various implementation concepts
At one point, it was realized that the current approach to security, assuming a certain “edge” of the network – the division […]