Fejléc
Media

Blog

More articles →

8 benefits of AI-empowered networking

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.03.27

Discover how AI is making enterprise networks more efficient, secure and economical - real-time response, automation, optimization.

Orlando’s cybersecurity revolution: innovation, protection and the future of digital security

Szerző ikon

Dátum ikon 2025.03.20

Orlando is a leader in cybersecurity, where universities, startups and military research are working together to shape the future of digital security.

Past Excel: ERSTE bank’s road to automated risk management with Archer’s GRC solution

Szerző ikon Ivett Dobay

Dátum ikon 2025.03.18

Successful GRC implementation at ERSTE Bank! Find out how we helped to make audit and risk management more efficient with Archer.

Protecting Your Organization from Phishing Attacks with Purple Teaming

Szerző ikon Ivett Dobay

Dátum ikon 2025.03.13

Purple Teaming is a more targeted and effective way to defend against phishing attacks. Red Team and Blue Team work together to use real-world simulations to identify security weaknesses in an organisation, improving incident management strategies and employee preparedness.

Managing business risks with modern tools

Szerző ikon Ivett Dobay

Dátum ikon 2025.02.20

Find out how to reduce your business risks and ensure compliance! Archer GRC solutions can be implemented and customized by EURO ONE GRC experts.

Cybersecurity in the United States: the role of US federal agencies

Szerző ikon Gergely Lesku

Dátum ikon 2025.02.10

The US cybersecurity system is based on cooperation between federal agencies. The IVLP program provides insight into government regulation and threat management, highlighting the role of the Department of Homeland Security, CISA and other organizations in maintaining digital security.

Why the People, Process, Technology framework should be applied in a modern IT security strategy

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.02.06

The strategy of People, Process, Technology can be harmoniously integrated to create stronger IT security systems in large enterprise environments.

Application of Cyber Security TTP Principles in IT Security

Szerző ikon Gusztáv Krékity

Dátum ikon 2025.01.30

Applying TTP principles enables proactive cyber security defenses, increasing the effectiveness of threat detection and incident management.