Experiencing a breach?
Report the incident to the DFIR team
+48 22 162 19 85
Menu
Offer
Cybersecurity systems design and implementation
SOC as a Service
Incident response
Pentests
Technologies
Website testing and monitoring
Offer
Cybersecurity systems design and implementation
SOC as a Service
Incident response
Pentests
Technologies
Website testing and monitoring
Knowledge
Webinars
Presentations from cybersec experts
Events
Live meetings in your city
Blog
All you need to know about IT security
Ebooks
High quality content from our experts.
Knowledge
Webinars
Events
Blog
Ebooks
Company
About us
Projects
Company
About us
Projects
English
Polski
English
Contact
Search...
Tomasz Szóstek
◦
01/12/2025
DDoS
◦
App security
Anatomy of DDoS Attacks: Types, Operation, and Real-World Examples
Filip Duch
◦
25/11/2025
EDR
◦
SOC
Microsoft Defender from the perspective of a SOC360 engineer: what does an implementation look like?
Tomasz Szóstek
◦
31/10/2025
DDoS
◦
App security
◦
Strategy
Cloudflare Through the Eyes of Our Engineers: What Deployment Really Looks Like and What Surprises Clients
Piotr Malek
◦
24/10/2025
NGFW
◦
SD-WAN
◦
cloud
Palo Alto Overview: NGFW, SD-WAN, PAB and Cortex Cloud
Tomasz Szóstek
◦
09/10/2025
DDoS
5 Situations Where Cloudflare Proves Indispensable
4Prime IT Security
◦
01/10/2025
NDR
NDR Through the Eyes of 4Prime Engineers – Why Do So Many Customers Choose Greycortex?
Ula Rydigier
◦
29/08/2025
EDR
Singularity Endpoint – Advantages and Disadvantages of SentinelOne’s EDR System
Michał Malanowicz
◦
18/08/2025
cloud
Cloud compliance in practice – get to know SentinelOne’s CNAPP solution
◦
06/08/2025
2FA
Silverfort and Delinea: what to consider when choosing 2FA?
Maciej Szaciłowski
◦
28/07/2025
Firewall
Firewall as the foundation of security. How to choose the right NGFW for your organization’s needs?
Tomasz Gładkowski
◦
08/07/2025
AI
Phishing, deepfakes, and attack automation: how AI is reshaping the threat landscape
Kuba Pęksyk
◦
25/06/2025
SOC
AI vs. critical thinking in cybersecurity. Reflections from a SOC specialist
1
2
3
4
The attack on your company could have started a month ago.
Check how you can secure your organization today.
Talk to the expert