Fejléc

Blog

Zero Trust: The Next Step Beyond VPN

Szerző ikon Norbert Bedő

Dátum ikon 2025.08.28

The era of VPN is over. Discover how HPE Aruba Zero Trust is replacing legacy solutions to make your business more secure and efficient.

Invisible Battles: How AI Defends Against Its Own Kind

Szerző ikon Zsolt Vilhelm

Dátum ikon 2025.08.21

The front line of cyber warfare is AI: Palo Alto Networks' innovative solutions detect, block, and prevent invisible, AI-based attacks and data loss in real time.

AI Risks and Responsibility: Lessons from Real Cases and New EU Rules

Szerző ikon Éva Dr. Kerecsen

Dátum ikon 2025.08.14

How is AI changing the concept of responsibility? Real stories and new EU rules for the safe and lawful use of AI.

Why Excel can’t protect against ransomware – GRC platform is the solution

Szerző ikon Ivett Dobay

Dátum ikon 2025.08.07

Cyber-attacks don't require permission - if you still rely on Excel spreadsheets, it's time to learn what a real, event-driven GRC platform can offer.

NIS2 Compliance in Hungary: Key Insights and Lessons from Early Audits

Szerző ikon Gergely Lesku

Dátum ikon 2025.07.31

NIS2 is not only a challenge, but also an opportunity for development - audit experiences and practical advice for successful compliance and strengthening digital security.

Proactive Cybersecurity with AI: Staying Ahead of Threats

Szerző ikon Tamás Barna

Dátum ikon 2025.07.24

AI is the foundation of future-proof cybersecurity: visibility, risk-based decisions and proactive defence for effective enterprise protection.

Why NetWitness Is the “Formula 1 Engine” of SOCs

Szerző ikon Helmut Wahrmann, Mateusz Flak

Dátum ikon 2025.07.17

Don't react when it's too late! NetWitness anticipates attacks, analyses network traffic and detects hidden threats in time.

Who’s in charge? AI and cybersecurity at the critical turning point

Szerző ikon István Oláh

Dátum ikon 2025.07.10

AI is not only a tool but also a challenge in cybersecurity. Explore the key issues of ethical use, control and regulation.

New AI Analyst in our SOC: 3-Month Review

Szerző ikon Gábor Szabó

Dátum ikon 2025.07.01

Our new AI Analyst has been working in our SOC team for 3 months - we share our experiences, results and lessons learned from the implementation.

Smarter Networks, Stronger Business: The Case for Proactive NPM

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.05.29

Proactive network monitoring, for example with Flowmon, is not just an IT benefit, it's a business benefit: better performance, less downtime, happier customers.

Data leaks and ransomware in 2025 – what can we learn from Verizon’s annual report?

Szerző ikon Ivett Dobay

Dátum ikon 2025.05.22

The Verizon DBIR 2025 report reveals the dynamics of modern cyber-attacks: with AI, human error and ransomware increasing exposure - it's no longer enough to respond.

Cyber security and emergency preparedness in Seattle, Washington

Szerző ikon Gergely Lesku

Dátum ikon 2025.05.13

AI threats, an earthquake-resistant headquarters and global cyber warfare - Seattle has not only impressed, it has educated.

Darkweb and AI: A New Era of Cyber Threats for Businesses

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.05.08

The Darkweb and AI are ushering in a new era of cyber-attacks. Learn about the latest threats and the keys to effective defense.

Juniper Mist AI: Smarter, Simpler Network Management

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.04.24

Learn about the future of network management! With Juniper Mist AI, automated, intelligent operations are no longer a luxury, they're an achievable reality.

The Power of AI and ML in Modern Network Traffic Analysis

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.04.11

Sophisticated attacks? Not an obstacle! Learn how AI and ML hunt down hidden threats in real time with minimal false alarms!

Colorado’s Cyber Frontier: Innovation, Education, and Shaping the Future

Szerző ikon Gergely Lesku

Dátum ikon 2025.04.04

From high-tech campuses to cyber crisis simulations, Colorado is a rising force in U.S. cybersecurity. Discover how education, public institutions, and the private sector collaborate to defend digital and space infrastructure.