Blog
Preparing for the Quantum Era: A Strategic Priority for CIOs and CISOs
                     Gusztáv Krékity
                    Gusztáv Krékity                
                     2025.10.30
                    2025.10.30                
Quantum computing is ushering in a new era of cybersecurity. Discover how Palo Alto combines AI and PQC technology for future-proof protection.
AI in Operations – When IT Becomes a Service Provider
                     Zoltán Becker
                    Zoltán Becker                
                     2025.10.24
                    2025.10.24                
Less manual work, faster decisions, and more reliable systems—this is how AI is transforming operations.
When Artificial Intelligence Learns Within Company Walls
                     Levente Nepp
                    Levente Nepp                
                     2025.10.16
                    2025.10.16                
The development of DocuScan takes AI to a new level: it operates in a closed environment, is data secure, and provides customized solutions for every industry.
How Artificial Intelligence Is Transforming Development and Business Processes
                     Márta Szabó
                    Márta Szabó                
                     2025.10.09
                    2025.10.09                
Discover how AI increases efficiency, speeds up customer service, and makes operations more transparent—with tangible results at every level.
Smarter Incident Management with AI: Half a Year of Experience
                     Gábor Szabó
                    Gábor Szabó                
                     2025.10.02
                    2025.10.02                
Amidst a shortage of specialists and increasing attacks, the AI agent has proven that it can speed up processes and improve cybersecurity.
Fraudsters Exploit SharePoint for Phishing Attacks
                     Tibor Csavdári
                    Tibor Csavdári                
                     2025.09.18
                    2025.09.18                
SharePoint phishing attacks are becoming increasingly sophisticated. Don't fall for deceptive links – recognize the signs and protect your company's data!
AI in Networking: Mist’s Next Chapter and HPE’s Bold Move
                     Gusztáv Krékity
                    Gusztáv Krékity                
                     2025.09.11
                    2025.09.11                
A HPE és Juniper AI-alapú hálózata új korszakot nyit: önműködő rendszerek, nagyobb biztonság és kiemelkedő hatékonyság a vállalatok jövőjéért.
Building Cyber Resilience Without Borders and the help of AI
                     Predrag Puharic
                    Predrag Puharic                
                     2025.09.04
                    2025.09.04                
Discover how Bosnia is building cybersecurity resilience through the CSEC community initiative, without a national CERT or government backing.
Zero Trust: The Next Step Beyond VPN
                     Norbert Bedő
                    Norbert Bedő                
                     2025.08.28
                    2025.08.28                
The era of VPN is over. Discover how HPE Aruba Zero Trust is replacing legacy solutions to make your business more secure and efficient.
Invisible Battles: How AI Defends Against Its Own Kind
                     Zsolt Vilhelm
                    Zsolt Vilhelm                
                     2025.08.21
                    2025.08.21                
The front line of cyber warfare is AI: Palo Alto Networks' innovative solutions detect, block, and prevent invisible, AI-based attacks and data loss in real time.
AI Risks and Responsibility: Lessons from Real Cases and New EU Rules
                     Éva Dr. Kerecsen
                    Éva Dr. Kerecsen                
                     2025.08.14
                    2025.08.14                
How is AI changing the concept of responsibility? Real stories and new EU rules for the safe and lawful use of AI.
Why Excel can’t protect against ransomware – GRC platform is the solution
                     Ivett Dobay
                    Ivett Dobay                
                     2025.08.07
                    2025.08.07                
Cyber-attacks don't require permission - if you still rely on Excel spreadsheets, it's time to learn what a real, event-driven GRC platform can offer.
NIS2 Compliance in Hungary: Key Insights and Lessons from Early Audits
                     Gergely Lesku
                    Gergely Lesku                
                     2025.07.31
                    2025.07.31                
NIS2 is not only a challenge, but also an opportunity for development - audit experiences and practical advice for successful compliance and strengthening digital security.
Proactive Cybersecurity with AI: Staying Ahead of Threats
                     Tamás Barna
                    Tamás Barna                
                     2025.07.24
                    2025.07.24                
AI is the foundation of future-proof cybersecurity: visibility, risk-based decisions and proactive defence for effective enterprise protection.
Why NetWitness Is the “Formula 1 Engine” of SOCs
                     Helmut Wahrmann, Mateusz Flak
                    Helmut Wahrmann, Mateusz Flak                
                     2025.07.17
                    2025.07.17                
Don't react when it's too late! NetWitness anticipates attacks, analyses network traffic and detects hidden threats in time.
Who’s in charge? AI and cybersecurity at the critical turning point
                     István Oláh
                    István Oláh                
                     2025.07.10
                    2025.07.10                
AI is not only a tool but also a challenge in cybersecurity. Explore the key issues of ethical use, control and regulation.
 
                 
                 
                 
             
               
 
                 
                 
                 
                 
                 
                 
                 
                 
                 
                 
                 
                 
                 
                 
                