top of page
CYBERSOCURITY
DIARIES
GUIDE TO BUILDING
YOUR CYBERSECURITY RESILIENCE



"It's a misunderstanding that I need security because of NIS2" - Socurity Diaries - Season 3.
In the third season of our series, our colleague talks to cybersecurity experts about data asset protection, Identity Access Management...
2


How do we manage the corporate Apple fleet?
Part 2: Jamf Connect Jamf Connect is a tool designed specifically for Apple devices to simplify user identification and authentication,...
0


How to manage the corporate Apple fleet?
PART 1: Jamf PRO (formerly Jamf Now) features and how they work Managing an apple fleet should not be a nightmare Device registration...
4


Artificial Intelligence Assisted Cyber Attacks
Artificial intelligence has become a key technology in every corporate IT toolkit - and a weapon for cybercriminals. Attackers are able...
8


Practical OSINT Strategies in Daily Cybersecurity
OSINT means Open-Source Intelligence which is an important skill for professionals. To understand what it means in the practical life we...
20


Using Crowdstrike to ingest and correlate logs for Microsoft Entra (Azure AD)
for improved visibility and compliance with the NIS2 framework Nowadays cybersecurity and compliance with various intergovernmental...
89


Why Do Cybercriminals Like Legacy Antivirus?
Legacy antivirus (AV) is no longer capable of stopping adversaries. Modern endpoint security is required to stop breaches — period.
28


Why Security Awareness Training is crucial?
Why do users need Security Education and why Proofpoint Security Awareness Training is better than others?
29


Introducing our Vendors
As our colleagues often say: cybersecurity is like playing with LEGO bricks – you need to assemble systems block by block, which is both...
144
bottom of page