Socwise logo

All you need to know about TISAX

03/13/2023
Hüvelyes Péter 
read more

socwise blog

13/03/2023

All you need to know about TISAX

Hüvelyes Péter
The background to the creation of TISAX The way businesses operate has been radically transformed in recent decades, with a huge increase in their dependence on IT. It is now unimaginable that a company does not use IT systems in almost any aspect of its operations. Its technical support requires an ever-increasing IT capacity, an […]
read more
14/02/2023

Digital Operational Resilience Act (DORA)

Hüvelyes Péter
Brief Background The digitisation of the financial sector and paralelly its exposure is ever increasing. To date, different financial supervisors across the EU have addressed ICT risks in different ways and with different levels of effectiveness. EU Regulation 2022/2554 on digital operational resilience for the financial sector, officially known as the Digital Operational Resilience Act […]
read more
11/02/2023

Steps for NIS 2 compliance

Tamás Tóth
Following our previous articles on the NIS 2 Directive (hereafter: directive), in the next part of article series we will give you some practical advice on how to prepare for compliance. As you know, the deadline for transposition of the Directive into national law is October 2024, but there is no news yet on which […]
read more
17/01/2023

The NIS2 Directive has been published. What’s next?

Tamás Tóth
On 27th of December 2022, the Commission of the European Union published the NIS2 Directive (furthermore: Directive), which will enter into force on 16th of January 2023, and Member States have to transpose the provisions into their national legislation until 17th of October 2024. In this article, I will summarize what is new in the […]
read more
06/09/2022

Malware reverse engineering in a SOC

Szabó Gábor
Before we dive deep into malware reverse engineering (MRE), it’s worth talking a little about the steps that precede it. There are a multitude of technologies that were designed to help detect malicious codes, such as antivirus tools, EDR systems, and various kinds of sandboxes. These all utilize static and dynamic analysis techniques to reveal […]
read more
11/08/2022

It’s not just tech – How criminal hacker organizations really work

Lesku Gergely
When it comes to IT security, cybercrime prevention, or any other defensive measures organizations apply to protect themselves from hacker attacks, people usually think of firewalls, SIEM, SOAR, and XDR platforms, or even full-blown, high-tech security operation centers meticulously utilizing a combination of these pieces of technology. What’s interesting, however, is that hardly anyone thinks […]
read more
18/05/2022

SOC Summit 2022

Polyák Beatrix
This year we held the SOC Summit in person in Munich on April 28 and 29, but the participants could join our conference live in Budapest or online. These two days were special for us not only because we had an event abroad for the first time, but also we received the Authorized European MSSP […]
read more
10/02/2022

SOCWISE to host SOC Summit ‘22

Bernadett Bak
Organized for the first time in 2019, Security Operations Center Summit Budapest quickly gained popularity in the cybersecurity community for being an outstanding platform for knowledge-sharing and collaboration. With more than 150 international participants joining the first event (even though it wasn’t even meant to be international), it instantly became one of the most important […]
read more
08/12/2021

SOCWISE has been certified to ISO/IEC 27001:2013

Gálffy Emese
„We proudly announce that SOCWISE has been certified to ISO/IEC 27001:2013 international standard (ISMS). The preparation project ended with a successful audit, which resulted in the highlighting of several strengths. Such certification is a major milestone in the life of any organization, but in the cybersecurity industry, especially for a SOC, it is a basic […]
read more
1 2 3
crossmenu