Socwise logo

Hüvelyes Péter's Articles

13/06/2023

The relationship of ChatGPT and GDPR

Hüvelyes Péter

Artificial intelligence, such as ChatGPT, transforms interactions but raises privacy concerns. Learn how AI aligns with GDPR principles like data minimization, purpose limitation, and accountability, and explore the challenges of AI systems in protecting user data and ensuring transparency.

read more
06/04/2023

Risk Assessment in Operational Technology – The most common risks and how to avoid them

Hüvelyes Péter

Operational technology (OT) risk assessment is vital for critical infrastructure. Discover SOCWISE's methodology, common risks like DoS attacks, and strategies to protect industrial systems from vulnerabilities and threats. Achieve robust OT cybersecurity with proactive measures and analysis.

read more
13/03/2023

All you need to know about TISAX

Hüvelyes Péter

TISAX standardizes cybersecurity requirements for the automotive industry, addressing risks like data breaches and industrial espionage. Learn about its objectives, processes, and benefits, and how SOCWISE can guide you to certification.

read more
14/02/2023

Digital Operational Resilience Act (DORA)

Hüvelyes Péter

DORA sets detailed standards for ICT risk management in the financial sector. Effective January 2025, financial institutions and ICT providers must implement robust digital resilience frameworks. Start your compliance journey now with expert guidance and gap assessments.

read more
05/12/2020

Why do companies perform weaker in Response?

Hüvelyes Péter

Many companies struggle with cybersecurity response. SOCWISE reveals common gaps in SIEM usage and incident handling, offering expert advice to build a stronger, more responsive SOC.

read more
27/09/2020

Measurement based development approach to get your SOC to the next level

Hüvelyes Péter

The most common motivations behind the development of a SOC are the need to centralize cybersecurity operations, to improve the visibility of the organization as a whole, the need to manage ever-increasing risks, to improve threat detection and to reduce exposure to threats. In addition, laws and regulations may also define centralized cyber defense monitoring and operations.

read more
crossmenu
SOCWISE
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.