News

EDR and NDR – efficient protection of IT infrastructure against current threats

Cybersecurity draws in many aspects from military concepts used to combat aggressors on the battlefields. As...
Read more

What is context cybersecurity and why is it important?

The Oxford Dictionary defines "context" as "the circumstances that form the setting around an event, stateme...
Read more

How important is the security of mobile devices and why it is a worthy investment?

Nowadays is when mobility forces companies to leave data in the hands of employees. Access restrictions ofte...
Read more

Protect your business by securing your e-mail

Since its introduction, email has been the most common form of office communication, but also a vector for t...
Read more

„Zero Trust Network” – various implementation concepts

At one point, it was realized that the current approach to security, assuming a certain "edge" of the networ...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info