
How not to go bankrupt from industrial digitalization
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
28 articles
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
How to assess all the complexities of open-source application integration in advance, and choose the most efficient solutions.
While open-source projects let you build almost any infosec solution, it’s crucial to realistically assess your team’s resources and the time it would take to achieve your goals.
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
How organizations implement zero-trust principles, and what CISOs advise for project success.
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
What information does an MDR service need to protect a company from complex targeted attacks?
What benefits do hybrid clouds and containerization bring to businesses — and what measurable impact do cybersecurity tools make?
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
What IT and cybersecurity leaders need to know about implementing network detection and response.
Today we tell you about our practices for releasing new products, and also updating existing releases, which reduce the risk of large-scale incidents.
Medium-sized businesses increasingly find themselves on the receiving end of targeted attacks. What tools does one need when basic security proves inadequate?
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We take an in-depth look at securing and configuring containerization systems.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.