Articles by the author
List of articles:
Network microsegmentation: how to stop an attacker who has already gotten in?
Traditional network security resembles a castle with a massive defensive wall, but an open space inside. Once an enemy overcomes…
How to build an effective SOC team: key roles, competencies and processes
An effective Security Operations Center (SOC) is much more than just expensive software. It is first and foremost people, processes…
KSC/NIS2: Why is one end-to-end partner critical to the success of the implementation?
Are you facing a KSC/NIS2 challenge and wondering how to organize it? Engaging separate companies for auditing, implementation and monitoring…
SOAR platforms: how automation and orchestration are revolutionizing SOC work?
SOC analysts are drowning in repetitive tasks and alerts while real threats demand their attention. SOAR platforms act as a…
How is KSC NIS2 revolutionizing procurement processes? A Guide for the Head of Procurement
Until now, IT purchases have been all about price and functionality. KSC/NIS2 and the SCRM requirement are changing all that….
Phishing 2.0: how to defend against the new generation of cyber fraud?
Classic phishing with grammatical errors is becoming a thing of the past. Today we are dealing with Phishing 2.0 -…
Smishing and vishing: how to defend a company from social engineering via SMS and phone?
A fake SMS message about an underpaid courier service or a phone call from a supposed bank employee asking for…
DORA vs. the FSA’s Recommendation D: How do past implementations help with compliance with the new regulation?
The financial sector has been living under regulatory pressure from the FSA for years. The implementation of Recommendation D and…
The government has approved an amendment to the KSC law. Gawkowski determined to complete work this year.
The six-year saga surrounding key legislation for the country’s cyber security is nearing its finale. The Council of Ministers has…
