Blog
Zero Trust: The Next Step Beyond VPN
Norbert Bedő
2025.08.28
The era of VPN is over. Discover how HPE Aruba Zero Trust is replacing legacy solutions to make your business more secure and efficient.
Invisible Battles: How AI Defends Against Its Own Kind
Zsolt Vilhelm
2025.08.21
The front line of cyber warfare is AI: Palo Alto Networks' innovative solutions detect, block, and prevent invisible, AI-based attacks and data loss in real time.
AI Risks and Responsibility: Lessons from Real Cases and New EU Rules
Éva Dr. Kerecsen
2025.08.14
How is AI changing the concept of responsibility? Real stories and new EU rules for the safe and lawful use of AI.
Why Excel can’t protect against ransomware – GRC platform is the solution
Ivett Dobay
2025.08.07
Cyber-attacks don't require permission - if you still rely on Excel spreadsheets, it's time to learn what a real, event-driven GRC platform can offer.
NIS2 Compliance in Hungary: Key Insights and Lessons from Early Audits
Gergely Lesku
2025.07.31
NIS2 is not only a challenge, but also an opportunity for development - audit experiences and practical advice for successful compliance and strengthening digital security.
Proactive Cybersecurity with AI: Staying Ahead of Threats
Tamás Barna
2025.07.24
AI is the foundation of future-proof cybersecurity: visibility, risk-based decisions and proactive defence for effective enterprise protection.
Why NetWitness Is the “Formula 1 Engine” of SOCs
Helmut Wahrmann, Mateusz Flak
2025.07.17
Don't react when it's too late! NetWitness anticipates attacks, analyses network traffic and detects hidden threats in time.
Who’s in charge? AI and cybersecurity at the critical turning point
István Oláh
2025.07.10
AI is not only a tool but also a challenge in cybersecurity. Explore the key issues of ethical use, control and regulation.
New AI Analyst in our SOC: 3-Month Review
Gábor Szabó
2025.07.01
Our new AI Analyst has been working in our SOC team for 3 months - we share our experiences, results and lessons learned from the implementation.
Smarter Networks, Stronger Business: The Case for Proactive NPM
Gusztáv Krékity
2025.05.29
Proactive network monitoring, for example with Flowmon, is not just an IT benefit, it's a business benefit: better performance, less downtime, happier customers.
Data leaks and ransomware in 2025 – what can we learn from Verizon’s annual report?
Ivett Dobay
2025.05.22
The Verizon DBIR 2025 report reveals the dynamics of modern cyber-attacks: with AI, human error and ransomware increasing exposure - it's no longer enough to respond.
Cyber security and emergency preparedness in Seattle, Washington
Gergely Lesku
2025.05.13
AI threats, an earthquake-resistant headquarters and global cyber warfare - Seattle has not only impressed, it has educated.
Darkweb and AI: A New Era of Cyber Threats for Businesses
Gusztáv Krékity
2025.05.08
The Darkweb and AI are ushering in a new era of cyber-attacks. Learn about the latest threats and the keys to effective defense.
Juniper Mist AI: Smarter, Simpler Network Management
Gusztáv Krékity
2025.04.24
Learn about the future of network management! With Juniper Mist AI, automated, intelligent operations are no longer a luxury, they're an achievable reality.
The Power of AI and ML in Modern Network Traffic Analysis
Gusztáv Krékity
2025.04.11
Sophisticated attacks? Not an obstacle! Learn how AI and ML hunt down hidden threats in real time with minimal false alarms!
Colorado’s Cyber Frontier: Innovation, Education, and Shaping the Future
Gergely Lesku
2025.04.04
From high-tech campuses to cyber crisis simulations, Colorado is a rising force in U.S. cybersecurity. Discover how education, public institutions, and the private sector collaborate to defend digital and space infrastructure.