Blog
Smarter Networks, Stronger Business: The Case for Proactive NPM
Gusztáv Krékity
2025.05.29
Proactive network monitoring, for example with Flowmon, is not just an IT benefit, it's a business benefit: better performance, less downtime, happier customers.
Data leaks and ransomware in 2025 – what can we learn from Verizon’s annual report?
Ivett Dobay
2025.05.22
The Verizon DBIR 2025 report reveals the dynamics of modern cyber-attacks: with AI, human error and ransomware increasing exposure - it's no longer enough to respond.
Cyber security and emergency preparedness in Seattle, Washington
Gergely Lesku
2025.05.13
AI threats, an earthquake-resistant headquarters and global cyber warfare - Seattle has not only impressed, it has educated.
Darkweb and AI: A New Era of Cyber Threats for Businesses
Gusztáv Krékity
2025.05.08
The Darkweb and AI are ushering in a new era of cyber-attacks. Learn about the latest threats and the keys to effective defense.
Juniper Mist AI: Smarter, Simpler Network Management
Gusztáv Krékity
2025.04.24
Learn about the future of network management! With Juniper Mist AI, automated, intelligent operations are no longer a luxury, they're an achievable reality.
The Power of AI and ML in Modern Network Traffic Analysis
Gusztáv Krékity
2025.04.11
Sophisticated attacks? Not an obstacle! Learn how AI and ML hunt down hidden threats in real time with minimal false alarms!
Colorado’s Cyber Frontier: Innovation, Education, and Shaping the Future
Gergely Lesku
2025.04.04
From high-tech campuses to cyber crisis simulations, Colorado is a rising force in U.S. cybersecurity. Discover how education, public institutions, and the private sector collaborate.
8 benefits of AI-empowered networking
Gusztáv Krékity
2025.03.27
Discover how AI is making enterprise networks more efficient, secure and economical - real-time response, automation, optimization.
Orlando’s cybersecurity revolution: innovation, protection and the future of digital security
Gergely Lesku
2025.03.21
Orlando is a leader in cybersecurity, where universities, startups and military research are working together to shape the future of digital security.
Past Excel: ERSTE bank’s road to automated risk management with Archer’s GRC solution
Ivett Dobay
2025.03.20
Successful GRC implementation at ERSTE Bank! Find out how we helped to make audit and risk management more efficient with Archer.
Protecting Your Organization from Phishing Attacks with Purple Teaming
Ivett Dobay
2025.03.13
Purple Teaming pairs Red + Blue Teams to run real-world phishing simulations, find org weaknesses, and boost incident response and employee readiness.
Cybersecurity in the United States: the role of US federal agencies
Gergely Lesku
2025.02.27
US cybersecurity relies on federal agency cooperation. IVLP shows regulation and threat management, highlighting DHS, CISA, and partners in protecting digital security.
Managing business risks with modern tools
Ivett Dobay
2025.02.20
Find out how to reduce your business risks and ensure compliance! Archer GRC solutions can be implemented and customized by EURO ONE GRC experts.
Why the People, Process, Technology framework should be applied in a modern IT security strategy
Gusztáv Krékity
2025.02.06
The strategy of People, Process, Technology can be harmoniously integrated to create stronger IT security systems in large enterprise environments.
Application of Cyber Security TTP Principles in IT Security
Gusztáv Krékity
2025.01.30
Applying TTP principles enables proactive cyber security defenses, increasing the effectiveness of threat detection and incident management.
Innovation and Customer Focus: Our Architect Team’s Mission
Ádám Karóczi
2025.01.23
The Architect team drives innovation, understands customer needs and ensures quality. They strengthen EURO ONE's competitiveness with creative solutions and robust systems.