top of page
CYBERSOCURITY
DIARIES
GUIDE TO BUILDING
YOUR CYBERSECURITY RESILIENCE



Artificial Intelligence in a Large Enterprise Environment - Human Impacts and Vision
Does it take away or help our jobs? Does it make it easier or more difficult for beginners to develop? What impact does it have on corporate culture? What can be expected in the near future? We sought answers to these questions in the final episode of our AI vodcast.
Â
Â


AI in corporate operations: smart modularity instead of Star Wars project
Many organizations are eager to change everything at once with AI - this will result in AI projects that last for years, there will be no quick, measurable results, and the company culture will also be damaged by failure. Our experience: An approach that works for any company size is that AI should be introduced purposefully and modularly. Automate or support a well-defined task - where the business impact can be immediately measured. From there, you can build, extend, and ma
Â
Â


Everyone wants 'it' – but do they really know what they need? Artificial Intelligence in enterprises: is GenAI truly the answer? - Part 1.
Our Experts dive deep into this question int the latest episode of CyberSOCurity Diaries.
Â
Â


"It's a misunderstanding that I need security because of NIS2" - Socurity Diaries - Season 3.
In the third season of our series, our colleague talks to cybersecurity experts about data asset protection, Identity Access Management...
Â
Â


How do we manage the corporate Apple fleet?
Part 2: Jamf Connect Jamf Connect is a tool designed specifically for Apple devices to simplify user identification and authentication,...
Â
Â


How to manage the corporate Apple fleet?
PART 1: Jamf PRO (formerly Jamf Now) features and how they work Managing an apple fleet should not be a nightmare Device registration...
Â
Â


Artificial Intelligence Assisted Cyber Attacks
Artificial intelligence has become a key technology in every corporate IT toolkit - and a weapon for cybercriminals. Attackers are able...
Â
Â


Practical OSINT Strategies in Daily Cybersecurity
OSINT means Open-Source Intelligence which is an important skill for professionals. To understand what it means in the practical life we...
Â
Â


Using Crowdstrike to ingest and correlate logs for Microsoft Entra (Azure AD)
for improved visibility and compliance with the NIS2 framework Nowadays cybersecurity and compliance with various intergovernmental...
Â
Â
bottom of page
