02/05/2023
Szalárdi Tamás –
Historical background The rise of digital banking and credit card transactions has opened up an innovative, forward-looking, but also dangerous dimension that has quickly become an integral part of our everyday lives, both for its convenience and practicality. Today, it is almost impossible to imagine life without online shopping, PayPass, ATM cash withdrawals, but at […]
read more20/04/2023
Polyák Beatrix –
Now that ChatGPT, an artificial intelligence chatbot, is on tap, the sci-fi scenes of self-aware intelligent machines gleefully murdering the protagonist's family and friends, or trying to destroy and enslave all of humanity in a variety of ways, are bound to come to mind. This may be one of the reasons why people are sceptical […]
read more06/04/2023
Hüvelyes Péter –
First used in 2006 by Gartner, the term ‘operational technology’, or OT for short, is meant to talk about hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes, and events. As OT is closely associated with critical infrastructures such as utility control systems, cybersecurity […]
read more13/03/2023
Hüvelyes Péter –
The background to the creation of TISAX The way businesses operate has been radically transformed in recent decades, with a huge increase in their dependence on IT. It is now unimaginable that a company does not use IT systems in almost any aspect of its operations. Its technical support requires an ever-increasing IT capacity, an […]
read more14/02/2023
Hüvelyes Péter –
Brief Background The digitisation of the financial sector and paralelly its exposure is ever increasing. To date, different financial supervisors across the EU have addressed ICT risks in different ways and with different levels of effectiveness. EU Regulation 2022/2554 on digital operational resilience for the financial sector, officially known as the Digital Operational Resilience Act […]
read more11/02/2023
Tamás Tóth –
Following our previous articles on the NIS 2 Directive (hereafter: directive), in the next part of article series we will give you some practical advice on how to prepare for compliance. As you know, the deadline for transposition of the Directive into national law is October 2024, but there is no news yet on which […]
read more17/01/2023
Tamás Tóth –
On 27th of December 2022, the Commission of the European Union published the NIS2 Directive (furthermore: Directive), which will enter into force on 16th of January 2023, and Member States have to transpose the provisions into their national legislation until 17th of October 2024. In this article, I will summarize what is new in the […]
read more06/09/2022
Szabó Gábor –
Before we dive deep into malware reverse engineering (MRE), it’s worth talking a little about the steps that precede it. There are a multitude of technologies that were designed to help detect malicious codes, such as antivirus tools, EDR systems, and various kinds of sandboxes. These all utilize static and dynamic analysis techniques to reveal […]
read more11/08/2022
Lesku Gergely –
When it comes to IT security, cybercrime prevention, or any other defensive measures organizations apply to protect themselves from hacker attacks, people usually think of firewalls, SIEM, SOAR, and XDR platforms, or even full-blown, high-tech security operation centers meticulously utilizing a combination of these pieces of technology. What’s interesting, however, is that hardly anyone thinks […]
read more