13/03/2023
Hüvelyes Péter –
The background to the creation of TISAX The way businesses operate has been radically transformed in recent decades, with a huge increase in their dependence on IT. It is now unimaginable that a company does not use IT systems in almost any aspect of its operations. Its technical support requires an ever-increasing IT capacity, an […]
read more14/02/2023
Hüvelyes Péter –
Brief Background The digitisation of the financial sector and paralelly its exposure is ever increasing. To date, different financial supervisors across the EU have addressed ICT risks in different ways and with different levels of effectiveness. EU Regulation 2022/2554 on digital operational resilience for the financial sector, officially known as the Digital Operational Resilience Act […]
read more11/02/2023
Tamás Tóth –
Following our previous articles on the NIS 2 Directive (hereafter: directive), in the next part of article series we will give you some practical advice on how to prepare for compliance. As you know, the deadline for transposition of the Directive into national law is October 2024, but there is no news yet on which […]
read more17/01/2023
Tamás Tóth –
On 27th of December 2022, the Commission of the European Union published the NIS2 Directive (furthermore: Directive), which will enter into force on 16th of January 2023, and Member States have to transpose the provisions into their national legislation until 17th of October 2024. In this article, I will summarize what is new in the […]
read more06/09/2022
Szabó Gábor –
Before we dive deep into malware reverse engineering (MRE), it’s worth talking a little about the steps that precede it. There are a multitude of technologies that were designed to help detect malicious codes, such as antivirus tools, EDR systems, and various kinds of sandboxes. These all utilize static and dynamic analysis techniques to reveal […]
read more11/08/2022
Lesku Gergely –
When it comes to IT security, cybercrime prevention, or any other defensive measures organizations apply to protect themselves from hacker attacks, people usually think of firewalls, SIEM, SOAR, and XDR platforms, or even full-blown, high-tech security operation centers meticulously utilizing a combination of these pieces of technology. What’s interesting, however, is that hardly anyone thinks […]
read more18/05/2022
Polyák Beatrix –
This year we held the SOC Summit in person in Munich on April 28 and 29, but the participants could join our conference live in Budapest or online. These two days were special for us not only because we had an event abroad for the first time, but also we received the Authorized European MSSP […]
read more10/02/2022
Bernadett Bak –
Organized for the first time in 2019, Security Operations Center Summit Budapest quickly gained popularity in the cybersecurity community for being an outstanding platform for knowledge-sharing and collaboration. With more than 150 international participants joining the first event (even though it wasn’t even meant to be international), it instantly became one of the most important […]
read more08/12/2021
Gálffy Emese –
„We proudly announce that SOCWISE has been certified to ISO/IEC 27001:2013 international standard (ISMS). The preparation project ended with a successful audit, which resulted in the highlighting of several strengths. Such certification is a major milestone in the life of any organization, but in the cybersecurity industry, especially for a SOC, it is a basic […]
read more