Fejléc
Media

Blog

More articles →

Managing business risks with modern tools

Szerző ikon Tamás Tóth

Dátum ikon 2025.02.20

Find out how to reduce your business risks and ensure compliance! Archer GRC solutions can be implemented and customized by EURO ONE GRC experts.

Application of Cyber Security TTP Principles in IT Security

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.01.30

Applying TTP principles enables proactive cyber security defenses, increasing the effectiveness of threat detection and incident management.

Innovation and Customer Focus: Our Architect Team’s Mission

Szerző ikon

Dátum ikon 2025.01.23

The Architect team aims to drive innovation, understand customer needs and ensure quality. They strengthen EURO ONE's competitiveness with creative solutions, new ideas and robust systems.

From Automation to Pentest: CDA Team’s Cybersecurity Solutions

Szerző ikon Erik Kovács

Dátum ikon 2025.01.16

Meet the CDA team that strengthens corporate IT security with defensive and offensive techniques, the latest technologies, automated systems and expert support.

Cybersecurity Challenges and Trends in 2025

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.01.09

Explore the cybersecurity trends and challenges of 2025, including AI-based attacks, Zero Trust and the impact of quantum technology. How do we protect ourselves?

Caught in a phishing net – How to protect yourself?

Szerző ikon Ádám Karóczi

Dátum ikon 2024.12.20

Protect your data from phishing attacks! Discover how you can prevent cyber attacks at both individual and corporate level.

International Cyber Security: the Role and Importance of the Business Development Team

Szerző ikon Gergely Lesku

Dátum ikon 2024.12.17

Introducing our business development team, which supports IT security internationally with innovative solutions and partnerships.

Why the People, Process, Technology framework should be applied in a modern IT security strategy

Szerző ikon Gusztáv Krékity

Dátum ikon 2024.12.12

The strategy of People, Process, Technology can be harmoniously integrated to create stronger IT security systems in large enterprise environments.