Fejléc

Blog

8 benefits of AI-empowered networking

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.03.27

Discover how AI is making enterprise networks more efficient, secure and economical - real-time response, automation, optimization.

Orlando’s cybersecurity revolution: innovation, protection and the future of digital security

Szerző ikon

Dátum ikon 2025.03.20

Orlando is a leader in cybersecurity, where universities, startups and military research are working together to shape the future of digital security.

Past Excel: ERSTE bank’s road to automated risk management with Archer’s GRC solution

Szerző ikon Ivett Dobay

Dátum ikon 2025.03.18

Successful GRC implementation at ERSTE Bank! Find out how we helped to make audit and risk management more efficient with Archer.

Protecting Your Organization from Phishing Attacks with Purple Teaming

Szerző ikon Ivett Dobay

Dátum ikon 2025.03.13

Purple Teaming is a more targeted and effective way to defend against phishing attacks. Red Team and Blue Team work together to use real-world simulations to identify security weaknesses in an organisation, improving incident management strategies and employee preparedness.

Managing business risks with modern tools

Szerző ikon Ivett Dobay

Dátum ikon 2025.02.20

Find out how to reduce your business risks and ensure compliance! Archer GRC solutions can be implemented and customized by EURO ONE GRC experts.

Cybersecurity in the United States: the role of US federal agencies

Szerző ikon Gergely Lesku

Dátum ikon 2025.02.10

The US cybersecurity system is based on cooperation between federal agencies. The IVLP program provides insight into government regulation and threat management, highlighting the role of the Department of Homeland Security, CISA and other organizations in maintaining digital security.

Why the People, Process, Technology framework should be applied in a modern IT security strategy

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.02.06

The strategy of People, Process, Technology can be harmoniously integrated to create stronger IT security systems in large enterprise environments.

Application of Cyber Security TTP Principles in IT Security

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.01.30

Applying TTP principles enables proactive cyber security defenses, increasing the effectiveness of threat detection and incident management.

Innovation and Customer Focus: Our Architect Team’s Mission

Szerző ikon

Dátum ikon 2025.01.23

The Architect team drives innovation, understands customer needs and ensures quality. They strengthen EURO ONE's competitiveness with creative solutions and robust systems.

From Automation to Pentest: CDA Team’s Cybersecurity Solutions

Szerző ikon Erik Kovács

Dátum ikon 2025.01.16

Meet the CDA team that strengthens corporate IT security with defensive and offensive techniques, the latest technologies, automated systems and expert support.

Cybersecurity Challenges and Trends in 2025

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.01.09

Explore the cybersecurity trends and challenges of 2025, including AI-based attacks, Zero Trust and the impact of quantum technology. How do we protect ourselves?

Caught in a phishing net – How to protect yourself?

Szerző ikon Ádám Karóczi

Dátum ikon 2024.12.20

Protect your data from phishing attacks! Discover how you can prevent cyber attacks at both individual and corporate level.

International Cyber Security: the Role and Importance of the Business Development Team

Szerző ikon Gergely Lesku

Dátum ikon 2024.12.17

Introducing our business development team, which supports IT security internationally with innovative solutions and partnerships.

But what have the Americans given us? – IVLP Programme Report

Szerző ikon Gergely Lesku

Dátum ikon 2024.12.12

Our colleague has visited the United States as part of the IVLP programme, and talks about his cybersecurity experiences and lessons learned from practical cooperation.

Project Management in InfoSec Division: the Key to Successful IT Security Projects

Szerző ikon Mónika Bikki

Dátum ikon 2024.12.10

Meet our project management team, which effectively manages IT security projects, aligning goals, timelines and resources.

How do SIEM systems support NIS2 and ISO 27001 requirements?

Szerző ikon Ádám Karóczi

Dátum ikon 2024.12.05

SIEM solutions help you meet ISO 27001:2022 and NIS2 requirements with real-time logging and security event management.