Fejléc

Blog

SpontEO – in IT Operation and Implementation

Szerző ikon Márta Szabó

Dátum ikon 2024.08.15

SpontEO is an advanced automation tool that supports IT infrastructure management and compliance with NIS2 requirements, including account management and upgrades.

Security Services for Cyber Physical Systems

Szerző ikon Péter Hunyadi

Dátum ikon 2024.08.09

Security solutions for cyber-physical systems, including OT protection, incident management and support for NIS2 compliance.

Why and how to focus on incident management?

Szerző ikon Gábor Szabó

Dátum ikon 2024.07.25

SIEM and SOAR systems provide automated incident management and rapid response to cyber security threats for NIS2 compliance.

What is Expected Today from Incident Management Tools: SIEM and SOAR

Szerző ikon Gergely Lesku

Dátum ikon 2024.07.18

SIEM and SOAR systems help to manage incidents quickly, with automation to support NIS2 compliance and cyber security incident response.

TXOne’s thoughtful solutions for industrial cyber defence

Szerző ikon Péter Hunyadi

Dátum ikon 2024.06.03

A TXOne ipari kiberbiztonsági megoldásai központosított kezeléssel, virtuális javítással és hálózati biztonsággal támogatják a gyártórendszerek védelmét.

The importance of IT inventories

Szerző ikon Tamás Tóth

Dátum ikon 2023.10.19

IT inventories help manage security risks and ensure compliance. Find out why these inventories are vital!

Use of Threat Reports in Information Security Risk Assessments

Szerző ikon Tamás Tóth

Dátum ikon 2023.09.07

The use of threat reports helps to identify real threats and adds value to information security instead of templated risk analyses.

The Relationship Between ChatGPT and GDPR

Szerző ikon Péter Hüvelyes

Dátum ikon 2023.06.15

How does ChatGPT comply with GDPR? Learn about AI data management practices and challenges related to user data protection.

PCI-DSS: to protect your card data

Szerző ikon Tamás Szalárdi

Dátum ikon 2023.05.03

The PCI-DSS standard protects card data for secure transactions. Learn about the new requirements and specifications in version 4.0.

From movies to reality: the pros and cons of ChatGPT

Szerző ikon Beatrix Polyák

Dátum ikon 2023.04.19

ChatGPT not only improves cybersecurity, but also poses serious risks, such as phishing, ransomware and social engineering attacks.

Everything you need to know about TISAX

Szerző ikon Péter Hüvelyes

Dátum ikon 2023.03.23

Achieving TISAX certification ensures that automotive suppliers meet uniform information security and cybersecurity requirements.

Purple Teaming: a new approach to red teaming

Szerző ikon Erik Kovács

Dátum ikon 2023.02.21

Purple Teaming enables more effective cybersecurity testing through collaboration between the red and blue teams, identifying vulnerabilities and improving defenses.

DORA: effective and consistent risk management practices for the financial sector

Szerző ikon Péter Hüvelyes

Dátum ikon 2023.02.14

The DORA regulation will standardize ICT risk management in the financial sector and will be mandatory from 2025 to increase digital resilience.

Steps to NIS2 compliance

Szerző ikon Tamás Tóth

Dátum ikon 2023.02.09

Get ready to comply with the NIS2 Directive! Learn the necessary steps from gap assessment through risk analysis to the development of sustainable security measures.

The NIS 2 Directive has been issued. Now what?

Szerző ikon Tamás Tóth

Dátum ikon 2023.01.10

The NIS2 Directive sets new requirements for cybersecurity, in particular in the areas of managerial responsibility and reporting obligations.

Technology isn’t everything: this is how hacking organizations really work

Szerző ikon Gusztáv Krékity

Dátum ikon 2022.10.13

Hacking organizations often launch attacks based on human factors rather than technical ones. Learn how to defend against insider threats and social engineering.