top of page

Search


The Open-Source Cybersecurity Ecosystem: A Sustainable, Transparent and Accessible Alternative to Commercial Tools
Modern cybersecurity relies on a dense and rapidly evolving ecosystem of tools, platforms and services. While most well-known solutions come from the commercial sector — often expensive and closed — a global community of developers continues to build a powerful, transparent and mature open-source ecosystem that today covers almost every security capability, from SIEM and EDR to SAST, SOAR, API protection and cloud security. Open-source brings a set of advantages that are par
2 days ago


Building a SOC (4/4): The SOC as the Heart of Cyber Resilience
From Lab to Operations Once components and workflows are in place, the next step is moving from a SOC-as-a-Lab setup to a fully operational 24/7 centre . At this point, technology alone isn’t the challenge — it’s capacity, processes, and performance management . The Operational Pillars of a Modern SOC People and Skills Sustainable SOCs depend on defined roles, shift rotations, and continuous training. In smaller teams, automation and clear playbooks compensate for limited s
Nov 11


Building a SOC (3/4): A SOC that Fits - Open-Source Blueprint
Why Open-Source? For most organisations in Bosnia and Herzegovina – especially in academia, civil society, and the SME sector – the biggest obstacles to establishing a SOC are not threats, but cost and staffing . Commercial SIEM and SOAR platforms can cost tens of thousands of euros per year, which is simply unrealistic for local budgets. The solution? An open-source SOC , built gradually, focusing on interoperability and community. Core idea: Instead of one central, monolit
Oct 27


Building a SOC (2/4): From Logs to Response – The Anatomy of a Modern SOC
What a SOC really is – more than just technology A Security Operations Centre (SOC) is not merely a room full of screens — it’s a function that unites technology, processes, and people to detect and neutralise threats before they cause damage. A well-designed SOC provides centralised visibility , correlates logs from multiple sources, and enables fast and coordinated response. It usually consists of three functional layers: Data collection and correlation – gathering logs f
Oct 17


BUILDING A SOC (1/4): Why we need a SOC - and where to start
As Cybersecurity Awareness Month unfolds, we’re launching a short blog series on a topic that’s often mentioned but rarely demystified -...
Oct 9
bottom of page
