top of page

Search


16 days of activism: Let's stop digital violence against women and girls
Digital violence against women and girls today is just as devastating as physical violence. Threats, blackmail, unauthorized publication of intimate content, deepfake manipulation, so-called. "revenge pornography", online monitoring - all these phenomena leave profound consequences for mental health, safety, women's participation in public space and overall equality. As a society, we still underestimate how much the digital space is a real space of violence. This year’s 16 Da
3 days ago


Building a SOC (4/4): The SOC as the Heart of Cyber Resilience
From Lab to Operations Once components and workflows are in place, the next step is moving from a SOC-as-a-Lab setup to a fully operational 24/7 centre . At this point, technology alone isn’t the challenge — it’s capacity, processes, and performance management . The Operational Pillars of a Modern SOC People and Skills Sustainable SOCs depend on defined roles, shift rotations, and continuous training. In smaller teams, automation and clear playbooks compensate for limited s
Nov 11


Building a SOC (3/4): A SOC that Fits - Open-Source Blueprint
Why Open-Source? For most organisations in Bosnia and Herzegovina – especially in academia, civil society, and the SME sector – the biggest obstacles to establishing a SOC are not threats, but cost and staffing . Commercial SIEM and SOAR platforms can cost tens of thousands of euros per year, which is simply unrealistic for local budgets. The solution? An open-source SOC , built gradually, focusing on interoperability and community. Core idea: Instead of one central, monolit
Oct 27


Building a SOC (2/4): From Logs to Response – The Anatomy of a Modern SOC
What a SOC really is – more than just technology A Security Operations Centre (SOC) is not merely a room full of screens — it’s a function that unites technology, processes, and people to detect and neutralise threats before they cause damage. A well-designed SOC provides centralised visibility , correlates logs from multiple sources, and enables fast and coordinated response. It usually consists of three functional layers: Data collection and correlation – gathering logs f
Oct 17


BUILDING A SOC (1/4): Why we need a SOC - and where to start
As Cybersecurity Awareness Month unfolds, we’re launching a short blog series on a topic that’s often mentioned but rarely demystified -...
Oct 9
bottom of page
