Articles by the author
List of articles:
API security – The most common threats and methods of protection
APIs have become the silent hero of digital transformation, connecting mobile apps, cloud services and partner systems. But this “hidden”…
OWASP Top 10: A Guide to the Top 10 Threats to Web Applications.
For more than 20 years, the OWASP Top 10 list has been the most important guidepost for developers and security…
Hardening IT infrastructure: How to seal the foundation of your digital fortress.
Every device and system in your company, straight “out of the box,” is like a house with open windows and…
Risk management in cyber security: How to make informed decisions and protect business?
In cyber security, it is impossible to eliminate 100% of risks. The key, then, is not to avoid risks at…
SZBI and the KSC NIS2 supply chain: How should the CISO build and implement procedures and manage supplier risk?
Implementing KSC/NIS2 is not just about technology. The real procedural challenge is building the ISMS and implementing supply chain risk…
Metrics and KPIs in cyber security: How do you measure and report on the effectiveness of your security department?
“We spend millions on security, but are we safer because of it?” – that’s the question every board asks itself….
Red Team, Blue Team, Purple Team: How do simulated attacks strengthen a company’s cyber resilience?
Imagine a boxing sparring match: one fighter attacks (Red Team), the other defends (Blue Team). Now imagine that after each…
Multi-cloud security: How to manage risk in a multi-cloud environment?
Your applications run in AWS, your analytics in GCP, and your office services in Azure. Welcome to the multi-cloud reality….
Amendment to the NSC Act (NIS2): What new obligations await Polish companies and how to prepare for them?
The amendment to the National Cyber Security System Act, implementing the EU’s NIS2 directive, is much more than just another…
