Prevention and Awareness


70 articles

Prevention and Awareness

Why zero trust is critical for healthcare cybersecurity

Why zero trust is critical for healthcare cybersecurity

Prevention and Awareness

Why zero trust is critical for healthcare cybersecurity

Despite pressure from regulators and diligent efforts to bolster cybersecurity, attacks are common and healthcare organizations remain at substantial risk.

Márk Szabó and Jakub Filip07 Apr 2026


Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

How to take legacy operational technology (OT) risks in manufacturing head-on

Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

Do you know how to bridge the gap between legacy risks and modern security needs?

Márk Szabó01 Apr 2026


Prevention and Awareness

Strong enough to lead: Navigating resilience in IT Security

Strong enough to lead: Navigating resilience in IT Security

Prevention and Awareness

Strong enough to lead: Navigating resilience in IT Security

What is core-code for leadership in IT security? Investing in resilience and trust.

Viktória Ivanová16 Mar 2026


Prevention and Awareness

You’ve got mail: How to secure your Microsoft Exchange server

You’ve got mail: How to secure your Microsoft Exchange server

Prevention and Awareness

You’ve got mail: How to secure your Microsoft Exchange server

Are email servers doomed to eternal vulnerability? International cybersecurity partners think otherwise.

Márk Szabó11 Mar 2026


Threat landscape, Prevention and Awareness

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Threat landscape, Prevention and Awareness

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Developments around renewable energy are moving fast. How can the sector ensure that cybersecurity keeps up in face of destructive attacks?

Márk Szabó and James Shepperd27 Jan 2026


Prevention and Awareness

What if? Security through the eyes of an attacker

What if? Security through the eyes of an attacker

Prevention and Awareness

What if? Security through the eyes of an attacker

There’s a version of your company only attackers ever see. It’s time you met it.

Márk Szabó26 Jan 2026


Prevention and Awareness

How social engineering attacks work: Psychology, tactics, and real examples

How social engineering attacks work: Psychology, tactics, and real examples

Prevention and Awareness

How social engineering attacks work: Psychology, tactics, and real examples

Why cybersecurity is no longer just about code – it’s about psychology.

Ben Tudor20 Jan 2026


Prevention and Awareness

Muddying the inbox: The hidden dangers of internal spearphishing

Muddying the inbox: The hidden dangers of internal spearphishing

Prevention and Awareness

Muddying the inbox: The hidden dangers of internal spearphishing

The latest ESET research sheds light on an advanced phishing technique that SOCs might find hard to catch.

Márk Szabó15 Jan 2026


Prevention and Awareness

Understanding DDoS attacks: a comprehensive guide

Understanding DDoS attacks: a comprehensive guide

Prevention and Awareness

Understanding DDoS attacks: a comprehensive guide

DDoS attacks are the loud side of cybercrime – designed to flood, crash, and cripple online services. Here’s what they are, how they work, and how you can stay protected.

Ben Tudor11 Dec 2025