Fejléc
Media

Blog

More articles →

Fraudsters Exploit SharePoint for Phishing Attacks

Szerző ikon Tibor Csavdári

Dátum ikon 2025.09.18

SharePoint phishing attacks are becoming increasingly sophisticated. Don't fall for deceptive links – recognize the signs and protect your company's data!

AI in Networking: Mist’s Next Chapter and HPE’s Bold Move

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.09.11

A HPE és Juniper AI-alapú hálózata új korszakot nyit: önműködő rendszerek, nagyobb biztonság és kiemelkedő hatékonyság a vállalatok jövőjéért.

Building Cyber Resilience Without Borders and the help of AI

Szerző ikon Predrag Puharic

Dátum ikon 2025.09.04

Discover how Bosnia is building cybersecurity resilience through the CSEC community initiative, without a national CERT or government backing.

Zero Trust: The Next Step Beyond VPN

Szerző ikon Norbert Bedő

Dátum ikon 2025.08.28

The era of VPN is over. Discover how HPE Aruba Zero Trust is replacing legacy solutions to make your business more secure and efficient.

Invisible Battles: How AI Defends Against Its Own Kind

Szerző ikon Zsolt Vilhelm

Dátum ikon 2025.08.21

The front line of cyber warfare is AI: Palo Alto Networks' innovative solutions detect, block, and prevent invisible, AI-based attacks and data loss in real time.

AI Risks and Responsibility: Lessons from Real Cases and New EU Rules

Szerző ikon Éva Dr. Kerecsen

Dátum ikon 2025.08.14

How is AI changing the concept of responsibility? Real stories and new EU rules for the safe and lawful use of AI.

Why Excel can’t protect against ransomware – GRC platform is the solution

Szerző ikon Ivett Dobay

Dátum ikon 2025.08.07

Cyber-attacks don't require permission - if you still rely on Excel spreadsheets, it's time to learn what a real, event-driven GRC platform can offer.

NIS2 Compliance in Hungary: Key Insights and Lessons from Early Audits

Szerző ikon Gergely Lesku

Dátum ikon 2025.07.31

NIS2 is not only a challenge, but also an opportunity for development - audit experiences and practical advice for successful compliance and strengthening digital security.