
„Zero Trust Network” – various implementation concepts
At one point, it was realized that the current approach to security, assuming a certain "edge" of the networ...
Read more

HOW TO EFFECTIVELY DETECT AND RESPOND TO AN ENDPOINT THREATS – 7 STRENGTHS OF A NEXT GENERATION SOLUTION
Threats observed in IT networks are becoming more and more advanced, which requires companies and instituti...
Read more

SOAR – a perfect complement to SIEM
In today's world, information is power. Especially in the world of cybersecurity. Information delivered on t...
Read more

What is event, incident, alert & notification
How many alerts creates incident? How does the event relate to the alert? What is the difference between not...
Read more

Data Loss Prevention combined with Data Classification – business benefits
GDPR, PCI DSS, NIS directive ... Due to the increasing digitalization, organizations and states require new ...
Read more