Blog
Protection against email attacks: solutions from Trend Micro
Gusztáv Krékity
2024.10.24
Trend Micro's AI-based and other solutions provide effective protection against compromised business email attacks. Learn more in our article!
Relationship between the NIS2 directive and IDM systems: How does IDM help with regulatory compliance?
Mónika Bikki
2024.10.17
IDM systems support NIS2 compliance, ensuring transparent management of privileges, auditability and rapid response to incidents.
Vulnerability Management: The Cornerstone of IT Security?!
Gusztáv Krékity
2024.09.26
Vulnerability management is fundamental to IT security, helping to prevent threats and ensure business continuity.
The relationship between Multi Factor Authentication and NIS2
Gusztáv Krékity
2024.09.10
Multi Factor Authentication (MFA) is essential for NIS2 compliance, strengthening corporate cyber security and providing protection against unauthorised access.
Endpoint Protection Solutions for NIS2 Compliance
Gusztáv Krékity
2024.09.02
EPP, EDR and XDR endpoint protection systems help you meet the requirements of the NIS2 Directive and ensuring effective protection against cyber attacks.
SpontEO – in IT Operation and Implementation
Márta Szabó
2024.08.15
SpontEO is an advanced automation tool that supports IT infrastructure management and compliance with NIS2 requirements, including account management and upgrades.
Security Services for Cyber Physical Systems
Péter Hunyadi
2024.08.09
Security solutions for cyber-physical systems, including OT protection, incident management and support for NIS2 compliance.
Why and how to focus on incident management?
Gábor Szabó
2024.07.25
SIEM and SOAR systems provide automated incident management and rapid response to cyber security threats for NIS2 compliance.
What is Expected Today from Incident Management Tools: SIEM and SOAR
Gergely Lesku
2024.07.18
SIEM and SOAR systems help to manage incidents quickly, with automation to support NIS2 compliance and cyber security incident response.
TXOne’s thoughtful solutions for industrial cyber defence
Péter Hunyadi
2024.06.03
A TXOne ipari kiberbiztonsági megoldásai központosított kezeléssel, virtuális javítással és hálózati biztonsággal támogatják a gyártórendszerek védelmét.
The importance of IT inventories
Tamás Tóth
2023.10.19
IT inventories help manage security risks and ensure compliance. Find out why these inventories are vital!
Use of Threat Reports in Information Security Risk Assessments
Tamás Tóth
2023.09.07
The use of threat reports helps to identify real threats and adds value to information security instead of templated risk analyses.
The Relationship Between ChatGPT and GDPR
Péter Hüvelyes
2023.06.15
How does ChatGPT comply with GDPR? Learn about AI data management practices and challenges related to user data protection.
PCI-DSS: to protect your card data
Tamás Szalárdi
2023.05.03
The PCI-DSS standard protects card data for secure transactions. Learn about the new requirements and specifications in version 4.0.
From movies to reality: the pros and cons of ChatGPT
Beatrix Polyák
2023.04.19
ChatGPT not only improves cybersecurity, but also poses serious risks, such as phishing, ransomware and social engineering attacks.
Everything you need to know about TISAX
Péter Hüvelyes
2023.03.23
Achieving TISAX certification ensures that automotive suppliers meet uniform information security and cybersecurity requirements.