Podcast | Cyber trends – what should we know?
Cyber security is a process that we need to approach comprehensively. On-the-spot action can give the illusion that ‘som...
How do we investigate system vulnerability to break-ins? How to obtain root privileges? Of course, by hacking into them, before a hacker does.
Maciej Grela, our chief services for IT security services uses a real-life example on how minor admin mistakes enables hijacking a large company server.
Cyber security is a process that we need to approach comprehensively. On-the-spot action can give the illusion that ‘som...
Let’s take a look at the most important advantages and disadvantages of cloud solutions. We will conduct the webinar tog...