Experiencing a breach?
Report the incident to the DFIR team
+48 22 162 19 85
Menu
Offer
Cybersecurity systems design and implementation
SOC as a Service
Incident response
Pentests
Technologies
Website testing and monitoring
Offer
Cybersecurity systems design and implementation
SOC as a Service
Incident response
Pentests
Technologies
Website testing and monitoring
Knowledge
Webinars
Presentations from cybersec experts
Events
Live meetings in your city
Blog
All you need to know about IT security
Ebooks
High quality content from our experts.
Knowledge
Webinars
Events
Blog
Ebooks
Company
About us
Projects
Company
About us
Projects
English
Polski
English
Contact
AI
What’s new in Cloudflare: AI traffic control, Cloudy assistant, and an intelligent WAF
Tomasz Szóstek
◦
31/03/2026
Search...
Tomasz Szóstek
◦
20/03/2026
DDoS
Cybersecurity in e-commerce: Key threats and practical protection strategies
◦
09/03/2026
SOC
SOC360 After 5 Years: Behind the Scenes, Decisions Under Pressure, and Lessons Learned — An Interview with the Team
Dorian Ślipiec
◦
04/03/2026
NDR
NDR in practice – use cases and scenarios where EDR is no longer enough
Rafał Rosłaniec
◦
27/02/2026
2FA
Identity protection without the need to redesign your infrastructure – how Silverfort works
4Prime IT Security
◦
20/02/2026
NIS2
NIS2 signed by the President — What’s Changing?
Ula Rydigier
◦
18/02/2026
NIS2
National Cybersecurity System Act (KSC): 15 practical tips on how to prepare your company for NIS2
Tomasz Szóstek
◦
16/02/2026
DDoS
The evolution of DDoS threats in 2026: 3 trends that could disrupt your business
Michał Horubała
◦
11/02/2026
Trends
Cyberattack on Poland’s Energy Sector: SOC Expert Insights Based on the CERT Report
Jakub Kwiatkowski
◦
18/12/2025
NDR
Fidelis Network Detection and Response – a solution for high-risk organizations
◦
17/12/2025
2FA
◦
PAM
Delinea and the development of PAM in an organization: a practical view from a security engineer
Sylwia Ryba
◦
04/12/2025
Strategy
Prisma Browser: everything you need to know about Web Browser Security
Tomasz Szóstek
◦
01/12/2025
DDoS
◦
App security
Anatomy of DDoS Attacks: Types, Operation, and Real-World Examples
1
2
3
4
The attack on your company could have started a month ago.
Check how you can secure your organization today.
Talk to the expert