Blog
From movies to reality: the pros and cons of ChatGPT
Beatrix Polyák
2023.04.19
ChatGPT not only improves cybersecurity, but also poses serious risks, such as phishing, ransomware and social engineering attacks.
Everything you need to know about TISAX
Péter Hüvelyes
2023.03.23
Achieving TISAX certification ensures that automotive suppliers meet uniform information security and cybersecurity requirements.
Purple Teaming: a new approach to red teaming
Erik Kovács
2023.02.21
Purple Teaming enables more effective cybersecurity testing through collaboration between the red and blue teams, identifying vulnerabilities and improving defenses.
DORA: effective and consistent risk management practices for the financial sector
Péter Hüvelyes
2023.02.14
The DORA regulation will standardize ICT risk management in the financial sector and will be mandatory from 2025 to increase digital resilience.
Steps to NIS2 compliance
Tamás Tóth
2023.02.09
Get ready to comply with the NIS2 Directive! Learn the necessary steps from gap assessment through risk analysis to the development of sustainable security measures.
The NIS 2 Directive has been issued. Now what?
Tamás Tóth
2023.01.10
The NIS2 Directive sets new requirements for cybersecurity, in particular in the areas of managerial responsibility and reporting obligations.
Technology isn’t everything: this is how hacking organizations really work
Gusztáv Krékity
2022.10.13
Hacking organizations often launch attacks based on human factors rather than technical ones. Learn how to defend against insider threats and social engineering.
Can we really talk about AI in cybersecurity?
Beatrix Polyák
2021.11.09
AI and cybersecurity: can AI really be used to protect against security threats?