Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Software Defined Network Security Benefits

Software Defined Network Security Benefits

What is SDN? Traditional networking uses integrated hardware and software to direct traffic across a series of routers and switches. Originally SDN was designed to virtualize the network by separating the control plane that manages the network from the data...

read more
Secure Messaging

Secure Messaging

Messaging is a part of the everyday life of almost all of us. And as a form of digital communication, it is subject to security issues applying to other forms of this kind of communication. Here are some hints to improve your security in this area Only use...

read more
Social Media Privacy & Security

Social Media Privacy & Security

Social Media is a nearly unlimited pool of information about its users. For starters, there is a multitude of information available on social media platforms that the users provide willingly with premeditation but sometimes it seems they do so with little...

read more
Everyday Network Security – Part 2

Everyday Network Security – Part 2

Continuing from last week on the topic of making a network secure for everyday use, the following recommendations are worth considering: Manage your SSID Change your network name SSID stands for Service Set Identifier and for the sake of simplicity we can...

read more
Everyday Network Security – Part 1

Everyday Network Security – Part 1

It will probably come as no surprise and is common knowledge by now that every klick you make online can be watched, logged, analysed, aggregated, and sold for profit. Depending on where you live, ‘Big Brother’ can use this information truly oppressively,...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.