Skip to content

Blog

Cybersecurity in the enterprise:
everything you need to know

Blog post
  • TAGS

partnership Vilnius tech_500x500

The partnership between HWG Sababa and Vilnius Gediminas Technical University (VILNIUS TECH) - an important research centre in the field of computer engineering with a strong presence in the cybersecurity…

3 minutes
new machinery regulation

The OT sector is undergoing a profound transformation driven by key trends that promise to reshape the industry's landscape, such as the increase in machine connectivity, the growing prevalence of…

2 minutes
penetration tester

In the ever-evolving landscape of cybersecurity, the role of a Penetration Tester has become paramount. According to the European Union Agency for Cybersecurity, these professionals play a crucial role in…

3 minutes
cybersecurity roles

Cybersecurity is gradually becoming more complex, which leads to an increase in responsibilities and, therefore, cybersecurity functions in organizations. Recently, the European Union Cybersecurity Agency (ENISA) published a classification report,…

7 minutes
penetration test on a PLC

A Penetration Test on a PLC highlights how protecting an ICS environment is not trivial, as these systems weren’t designed to resist cyber attacks. This means that you have to somehow integrate…

3 minutes
cybersecurity for smb

In 2025, small and midsize businesses (SMBs) are facing a cybersecurity crossroads. The rapidly evolving threat landscape, combined with economic uncertainty and increasingly complex IT environments, is challenging traditional approaches…

1 minute
digital forensics

The rise of cybercrime poses significant threats to individuals, organisations, and nations. Amidst this digital battleground, Digital Forensics Investigators employ their expertise to expose the truth hidden within the digital…

3 minutes
differences between OT e IT

Before diving into Google Dorks, let’s take a step back and understand why Google is such a powerful tool for information discovery. It is estimated that Google has stored more…

4 minutes
differences between OT e IT

For those coming from IT, securing ICS systems can be frustrating at the beginning. This is because the technologies used and the ways of working are very different when it…

3 minutes
cybersecurity risk manager

In today's hyper-connected world, where technology fuels every aspect of our lives, the need for robust cybersecurity measures has never been more critical . Businesses, governments, and individuals are increasingly…

3 minutes
Back To Top