by Józef Sulwiński | 25 May 2020 | Blog-EN
Michał Kwiatkowski How to enable multi-factor authentication in Office 365 The coronavirus pandemic has forced many organisations to undergo a rapid digital transformation and switch to a remote workforce. This sudden change created a need for tools allowing users...
by Józef Sulwiński | 10 May 2020 | Blog-EN
Michał Kwiatkowski Cloud computing is the foundation of many digital transformation projects. Currently, enterprises see progressively more value in the ability to scale the cloud environment, being able to transfer part of the responsibility for reliability onto a...
by Józef Sulwiński | 9 April 2020 | Blog-EN
Łukasz Dudkowski Can Building Management Systems be Potential Attack Vectors for Industrial Control Systems? For many enterprises, working with advanced industrial systems the simultaneous implementation and use of Building Management Systems (BMS) is necessary....
by Józef Sulwiński | 8 April 2020 | Blog-EN
Maciej Miszczyk QQBrowser is a web browser developed by Tencent. It is one of the most popular web browsers used in China. During our tests, we have found a vulnerability which allows an unprivileged local attacker to gain code execution as NT AUTHORITYSYSTEM....
by Józef Sulwiński | 2 April 2020 | Blog-EN
Michał Stępień In factories, companies and enterprises, cybersecurity for IT and OT departments should not be treated as separate issues. Historically, OT engineers have treated IT as a necessary evil, some of them even would go as far as “locking the infrastructure...