top of page
CYBERSOCURITY
DIARIES
GUIDE TO BUILDING
YOUR CYBERSECURITY RESILIENCE



"It's a misunderstanding that I need security because of NIS2" - Socurity Diaries - Season 3.
In the third season of our series, our colleague talks to cybersecurity experts about data asset protection, Identity Access Management...
Â
Â


How do we manage the corporate Apple fleet?
Part 2: Jamf Connect Jamf Connect is a tool designed specifically for Apple devices to simplify user identification and authentication,...
Â
Â


How to manage the corporate Apple fleet?
PART 1: Jamf PRO (formerly Jamf Now) features and how they work Managing an apple fleet should not be a nightmare Device registration...
Â
Â


Artificial Intelligence Assisted Cyber Attacks
Artificial intelligence has become a key technology in every corporate IT toolkit - and a weapon for cybercriminals. Attackers are able...
Â
Â


Practical OSINT Strategies in Daily Cybersecurity
OSINT means Open-Source Intelligence which is an important skill for professionals. To understand what it means in the practical life we...
Â
Â


Using Crowdstrike to ingest and correlate logs for Microsoft Entra (Azure AD)
for improved visibility and compliance with the NIS2 framework Nowadays cybersecurity and compliance with various intergovernmental...
Â
Â


Why Do Cybercriminals Like Legacy Antivirus?
Legacy antivirus (AV) is no longer capable of stopping adversaries. Modern endpoint security is required to stop breaches — period.
Â
Â


Why Security Awareness Training is crucial?
Why do users need Security Education and why Proofpoint Security Awareness Training is better than others?
Â
Â


Introducing our Vendors
As our colleagues often say: cybersecurity is like playing with LEGO bricks – you need to assemble systems block by block, which is both...
Â
Â
bottom of page