Podatności w sieci

Exposure Management

Hostile IT environments: how cybercriminals hunt for vulnerabilities across networks

Ataki na tożsamość użytkowników

SOC

The rise in popularity of Microsoft Office and attacks on user identities

null

Strategy

What makes vulnerability management difficult? Key challenges

Twoja firma została zaatakowana przez grupę ransomware – co teraz? Plan działania

Strategy

Your Company Has Been Attacked by a Ransomware Group – What Now? An Action Plan

EDR nie jest nieomylny – techniki obchodzenia mechanizmów detekcji

EDR

EDR Is Not Infallible – Techniques for Bypassing Detection Mechanisms

EDR czy antywirus? Co wybrać dla swojej organizacji

EDR

EDR or Antivirus? What should you choose for your organization

KSC i DORa

NIS2

KSC and DORA in practice: challenges, technologies, and processes

Threat hunting

Strategy

Threat Hunting – a proactive cybersecurity strategy for organizations

Co to jest SOC? Główne obszary działania i technologie

SOC

What Is SOC? Key areas of operation and technologies

Czym jest Cyber Threat Intelligence i jak wspiera organizacje w ochronie przez zagrożeniami

Threat Intelligence

What is Cyber Threat Intelligence and how does it support organizations in protecting against threats?

Wywiad z Michałem Horubałą

SOC

“There are no constants in cybersecurity” – A conversation with Michał Horubała, SOC360 Director

EDR, NDR, SIEM

EDR

NDR

SIEM

EDR, NDR, and SIEM: Key Elements of IT Security Architecture

The attack on your company could have started a month ago.

Check how you can secure your organization today.