top of page

Search


Phishing Awareness - From Campaigns to Real Behaviour Change
Phishing remains the single most effective cyberattack method globally. Not because people are careless — but because phishing attacks are designed to look legitimate, urgent, and familiar. Modern phishing is no longer full of spelling mistakes and suspicious logos. It uses: real company branding compromised email accounts personal data from previous breaches carefully timed messages (invoices, delivery notices, HR emails) This is why awareness must go beyond “don’t click lin
2 days ago


New Year, New Security Habits
Foundations of Cyber Awareness & Security Posture The start of a new year is when people rethink routines: how they work, how they manage time, how they protect their health. Cybersecurity should be no different. Most cyber incidents do not happen because of sophisticated hackers or zero-day exploits. They happen because of small, repeated behaviours: reused passwords, ignored updates, clicking links without thinking, or assuming that “nothing will happen to us”. Cybersecurit
3 days ago


The Open-Source Cybersecurity Ecosystem: A Sustainable, Transparent and Accessible Alternative to Commercial Tools
Modern cybersecurity relies on a dense and rapidly evolving ecosystem of tools, platforms and services. While most well-known solutions come from the commercial sector — often expensive and closed — a global community of developers continues to build a powerful, transparent and mature open-source ecosystem that today covers almost every security capability, from SIEM and EDR to SAST, SOAR, API protection and cloud security. Open-source brings a set of advantages that are par
Dec 2, 2025


16 days of activism: Let's stop digital violence against women and girls
Digital violence against women and girls today is just as devastating as physical violence. Threats, blackmail, unauthorized publication of intimate content, deepfake manipulation, so-called. "revenge pornography", online monitoring - all these phenomena leave profound consequences for mental health, safety, women's participation in public space and overall equality. As a society, we still underestimate how much the digital space is a real space of violence. This year’s 16 Da
Nov 27, 2025


Building a SOC (4/4): The SOC as the Heart of Cyber Resilience
From Lab to Operations Once components and workflows are in place, the next step is moving from a SOC-as-a-Lab setup to a fully operational 24/7 centre . At this point, technology alone isn’t the challenge — it’s capacity, processes, and performance management . The Operational Pillars of a Modern SOC People and Skills Sustainable SOCs depend on defined roles, shift rotations, and continuous training. In smaller teams, automation and clear playbooks compensate for limited s
Nov 11, 2025
bottom of page
