Fejléc

Blog

Caught in a phishing net – How to protect yourself?

Szerző ikon Ádám Karóczi

Dátum ikon 2024.12.20

Protect your data from phishing attacks! Discover how you can prevent cyber attacks at both individual and corporate level.

International Cyber Security: the Role and Importance of the Business Development Team

Szerző ikon Gergely Lesku

Dátum ikon 2024.12.17

Introducing our business development team, which supports IT security internationally with innovative solutions and partnerships.

But what have the Americans given us? – IVLP Programme Report

Szerző ikon Gergely Lesku

Dátum ikon 2024.12.12

Our colleague has visited the United States as part of the IVLP programme, and talks about his cybersecurity experiences and lessons learned from practical cooperation.

Project Management in InfoSec Division: the Key to Successful IT Security Projects

Szerző ikon Mónika Bikki

Dátum ikon 2024.12.10

Meet our project management team, which effectively manages IT security projects, aligning goals, timelines and resources.

How do SIEM systems support NIS2 and ISO 27001 requirements?

Szerző ikon Ádám Karóczi

Dátum ikon 2024.12.05

SIEM solutions help you meet ISO 27001:2022 and NIS2 requirements with real-time logging and security event management.

Meet our Engineering team: at the forefront of IT security

Szerző ikon Dániel Tóvaj

Dátum ikon 2024.12.03

EURO ONE Engineering: we protect your business systems with innovative engineering solutions and advanced IT security technologies.

ISO 27001:2022 and NIS2 requirements and applicability of SIEM solutions

Szerző ikon Tamás Tóth

Dátum ikon 2024.11.28

Discover how the SIEM system aligns with ISO 27001:2022 and NIS2 standards, supporting compliance and meeting cybersecurity requirements.

Meet our SOC team: Cybersecurity at your service on 7/24

Szerző ikon Tibor Csavdári

Dátum ikon 2024.11.26

The EURO ONE's SOC team ensures that companies' IT systems and data are protected with cutting-edge technologies and continuous monitoring.

The Zero Trust approach: Why is protection against internal threats becoming more important?

Szerző ikon Gusztáv Krékity

Dátum ikon 2024.11.21

The Zero Trust model increases enterprise security by controlling all access and automatically protecting the system from internal and external threats.

Introducing our GRC team: IT and OT security, you can count on us

Szerző ikon Gábor Bartha

Dátum ikon 2024.11.19

Our GRC team helps companies manage the risk and compliance requirements of IT/OT systems, improving security and efficiency.

Why is it Important to Integrate NAC Systems in an Enterprise IT System?

Szerző ikon Gusztáv Krékity

Dátum ikon 2024.11.14

The integration of NAC systems is key to enterprise IT security, enabling access restriction and protection of data assets.

Introducing our Network and IT Security Team: Protection in the Digital Space

Szerző ikon Gusztáv Krékity

Dátum ikon 2024.11.11

Our Network and IT Security team provides cutting-edge solutions to protect our customers' systems, ensuring continuous and secure operations.

IT Security Strategy with AI support

Szerző ikon Ivett Dobay

Dátum ikon 2024.11.06

AI-based solutions enable the standardization of IT security systems, increasing cybersecurity effectiveness against growing threats.

InfoSec20 – 20 years of our InfoSec Division

Szerző ikon Péter Sajó

Dátum ikon 2024.10.29

The EURO ONE InfoSec division turned 20 years old! Learn about our successes in cybersecurity and network security, and our future goals in managed services and AI technologies.

Protection against email attacks: solutions from Trend Micro

Szerző ikon Gusztáv Krékity

Dátum ikon 2024.10.24

Trend Micro's AI-based and other solutions provide effective protection against compromised business email attacks. Learn more in our article!

How does the NIS2 directive relate to IDM systems, and how do IDM systems support regulatory compliance?

Szerző ikon Mónika Bikki

Dátum ikon 2024.10.17

IDM systems support NIS2 compliance, ensuring transparent management of privileges, auditability and rapid response to incidents.