top of page

Search


The Monthly Cyber Resilience Series: MFA Done Right: Practical Setup and Common Pitfalls
If passwords are the weakest link, Multi-Factor Authentication (MFA) is the simplest and most effective reinforcement. MFA means proving your identity using at least two different factors: Something you know (password) Something you have (phone, hardware key) Something you are (biometrics) Even if a password is stolen through phishing or a data breach, MFA can stop the attacker from accessing the account. However, not all MFA is equal. Many organisations introduce MFA and ass
Feb 22


The Monthly Cyber Resilience Series: Why Passwords Still Fail Us
Passwords were never designed to carry the weight we place on them today. Yet they remain the primary key to our email, banking, cloud storage, collaboration platforms, and internal systems. Most security breaches do not begin with advanced hacking. They begin with a compromised account. And most compromised accounts trace back to one of three simple realities: Passwords are reused. Passwords are predictable. Passwords are stolen elsewhere and tried again. Attackers do not “g
Feb 12


The Open-Source Cybersecurity Ecosystem: A Sustainable, Transparent and Accessible Alternative to Commercial Tools
Modern cybersecurity relies on a dense and rapidly evolving ecosystem of tools, platforms and services. While most well-known solutions come from the commercial sector — often expensive and closed — a global community of developers continues to build a powerful, transparent and mature open-source ecosystem that today covers almost every security capability, from SIEM and EDR to SAST, SOAR, API protection and cloud security. Open-source brings a set of advantages that are par
Dec 2, 2025


Building a SOC (4/4): The SOC as the Heart of Cyber Resilience
From Lab to Operations Once components and workflows are in place, the next step is moving from a SOC-as-a-Lab setup to a fully operational 24/7 centre . At this point, technology alone isn’t the challenge — it’s capacity, processes, and performance management . The Operational Pillars of a Modern SOC People and Skills Sustainable SOCs depend on defined roles, shift rotations, and continuous training. In smaller teams, automation and clear playbooks compensate for limited s
Nov 11, 2025


Building a SOC (3/4): A SOC that Fits - Open-Source Blueprint
Why Open-Source? For most organisations in Bosnia and Herzegovina – especially in academia, civil society, and the SME sector – the biggest obstacles to establishing a SOC are not threats, but cost and staffing . Commercial SIEM and SOAR platforms can cost tens of thousands of euros per year, which is simply unrealistic for local budgets. The solution? An open-source SOC , built gradually, focusing on interoperability and community. Core idea: Instead of one central, monolit
Oct 27, 2025
bottom of page
