Articles by the author
List of articles:
Infrastructure as Code (IaC) security: How to avoid risky bugs in Terraform and Ansible?
One mistake in a Terraform script, one typo in an Ansible playbook – and your entire cloud infrastructure can stand…
Incident response (IR) plan: How to prepare your company for the moment of crisis?
In the chaos caused by a ransomware attack, every minute matters. Without a pre-prepared plan, companies make panicky, often wrong…
Network Access Control (NAC): How to regain control over who and what connects to your network.
Your corporate network is like an exclusive club. Do you let anyone who knocks in without checking who they are…
Network microsegmentation: how to stop an attacker who has already gotten in?
Traditional network security resembles a castle with a massive defensive wall, but an open space inside. Once an enemy overcomes…
How to build an effective SOC team: key roles, competencies and processes
An effective Security Operations Center (SOC) is much more than just expensive software. It is first and foremost people, processes…
KSC/NIS2: Why is one end-to-end partner critical to the success of the implementation?
Are you facing a KSC/NIS2 challenge and wondering how to organize it? Engaging separate companies for auditing, implementation and monitoring…
SOAR platforms: how automation and orchestration are revolutionizing SOC work?
SOC analysts are drowning in repetitive tasks and alerts while real threats demand their attention. SOAR platforms act as a…
How is KSC NIS2 revolutionizing procurement processes? A Guide for the Head of Procurement
Until now, IT purchases have been all about price and functionality. KSC/NIS2 and the SCRM requirement are changing all that….
Phishing 2.0: how to defend against the new generation of cyber fraud?
Classic phishing with grammatical errors is becoming a thing of the past. Today we are dealing with Phishing 2.0 -…
