top of page

Search


The Open-Source Cybersecurity Ecosystem: A Sustainable, Transparent and Accessible Alternative to Commercial Tools
Modern cybersecurity relies on a dense and rapidly evolving ecosystem of tools, platforms and services. While most well-known solutions come from the commercial sector — often expensive and closed — a global community of developers continues to build a powerful, transparent and mature open-source ecosystem that today covers almost every security capability, from SIEM and EDR to SAST, SOAR, API protection and cloud security. Open-source brings a set of advantages that are par
Dec 2


16 days of activism: Let's stop digital violence against women and girls
Digital violence against women and girls today is just as devastating as physical violence. Threats, blackmail, unauthorized publication of intimate content, deepfake manipulation, so-called. "revenge pornography", online monitoring - all these phenomena leave profound consequences for mental health, safety, women's participation in public space and overall equality. As a society, we still underestimate how much the digital space is a real space of violence. This year’s 16 Da
Nov 27


Building a SOC (4/4): The SOC as the Heart of Cyber Resilience
From Lab to Operations Once components and workflows are in place, the next step is moving from a SOC-as-a-Lab setup to a fully operational 24/7 centre . At this point, technology alone isn’t the challenge — it’s capacity, processes, and performance management . The Operational Pillars of a Modern SOC People and Skills Sustainable SOCs depend on defined roles, shift rotations, and continuous training. In smaller teams, automation and clear playbooks compensate for limited s
Nov 11


Building a SOC (3/4): A SOC that Fits - Open-Source Blueprint
Why Open-Source? For most organisations in Bosnia and Herzegovina – especially in academia, civil society, and the SME sector – the biggest obstacles to establishing a SOC are not threats, but cost and staffing . Commercial SIEM and SOAR platforms can cost tens of thousands of euros per year, which is simply unrealistic for local budgets. The solution? An open-source SOC , built gradually, focusing on interoperability and community. Core idea: Instead of one central, monolit
Oct 27


Building a SOC (2/4): From Logs to Response – The Anatomy of a Modern SOC
What a SOC really is – more than just technology A Security Operations Centre (SOC) is not merely a room full of screens — it’s a function that unites technology, processes, and people to detect and neutralise threats before they cause damage. A well-designed SOC provides centralised visibility , correlates logs from multiple sources, and enables fast and coordinated response. It usually consists of three functional layers: Data collection and correlation – gathering logs f
Oct 17
bottom of page
