Articles by the author
List of articles:
Microsoft 365 and Google Workspace security: 12 steps to protect your data
Your business runs on Microsoft 365 or Google Workspace. This is the center of your communication, collaboration and most valuable…
In-house SOC team or outsourcing? What cyber security strategy should you choose for your company?
Deciding how to provide a company with 24/7 security monitoring is one of the most important strategic investments. Building an…
Indicators of compromise (IoC) vs. anomalies: How to detect attacks at an early stage?
Detecting cyber attacks is like detective work. Sometimes you find concrete evidence of a crime – fingerprints or tools (IoC…
Business Continuity (BCP/DR) in the era of cyber attacks: How to survive a ransomware disaster?
Your Disaster Recovery plan assumes that the server room floods and you restore everything from backups. But what if the…
IDS/IPS systems: Why is a firewall alone not enough to protect your network?
Imagine that your firewall is a gatekeeper at the gate that only checks if the visitor has an invitation (IP…
SIEM from the ground up: what is it and why is it a key component of threat detection?
Every device in your company – from the firewall to the employee’s laptop – generates thousands of logs a day….
Threat hunting: how to proactively hunt for hidden threats in your network?
The most dangerous cybercriminals can hide online for months, bypassing automated defenses. Threat hunting is a change in philosophy -…
The use of AI by hackers: how is artificial intelligence changing the face of cyberattacks?
Tools such as ChatGPT have democratized access to advanced artificial intelligence. Unfortunately, hackers are also taking advantage of this. AI…
Cyber security in education: How to protect student data and school infrastructure in the digital age?
The digital transformation in education has brought e-journals, e-learning platforms and remote learning. But with it have come serious new…
