Articles by the author
List of articles:

What is AWS and how to safely use Amazon’s cloud to grow your business?
Amazon Web Services (AWS) is the global leader in cloud computing, offering companies incredible scalability and flexibility. But migrating to…

What is a TOR network and how to protect a company from the dangers associated with it?
The TOR network, often associated with anonymity and the “dark web,” is causing legitimate concern in the business world. Its…

Types of penetration tests: from Black Box to Crystal Box
Planning a penetration test, but not sure where to start? Choosing between black-box, grey-box and white-box approaches is crucial to…

Secure cloud transformation with AWS: How do you connect the dots between migration, protection and optimization without losing the purpose?
Learn how to safely execute a cloud transformation using AWS. Learn strategies for migration, data protection and cost optimization.

Wi-Fi penetration testing: Is your wireless gateway really locked to four triggers?
Learn how Wi-Fi penetration testing helps identify vulnerabilities in wireless networks and increase resilience against cyber threats.

Comprehensive Vulnerability Management: Your organization’s proactive shield against cyber attacks
Learn how to comprehensively manage IT vulnerabilities. Learn the processes, tools and benefits of effective security vulnerability management.

FortiGate Cloud-Native Firewall – Cloud security and a new paradigm in firewalls
Wondering how to effectively secure your cloud infrastructure?
From Vulnerabilities to Security: How Check Point Harmony Endpoint is revolutionizing endpoint protection
How to effectively protect endpoints from cyber threats?

The Future of Pentesting: How AI and Machine Learning are changing security testing.
Discover how artificial intelligence and machine learning are revolutionizing penetration testing, increasing efficiency and automation in detecting threats.