Socwise logo

The importance of IT inventories

01/08/2024
Tamás Tóth 
read more

socwise blog

08/01/2024

The importance of IT inventories

Tamás Tóth
If we would ask colleagues working in the field of information security, they would surely be able to point to several neglected areas and issues in their own field that need more attention. If you were to ask me, I would mention IT asset inventories, in this context IT asset, system and application inventories, which […]
read more
27/09/2023

Use of threat reports in information security risk assessments

Tamás Tóth
In this article, I would like to summarise how to replace the often run-of-the-mill, template-based risk assessments that are often produced on the fly due to compliance pressure on organisations, with real value-added assessments that consider real threats. This article is not intended to provide a detailed description of risk management methodologies and processes. Risk […]
read more
13/06/2023

The relationship of ChatGPT and GDPR

Hüvelyes Péter
The concept of artificial intelligence (AI) is not new; originally appearing in science fiction novels, AI has been in development for decades, with the first working chatting bot appearing as early as 1966. The reason why we hear it all the time now, is that with ChatGPT it is the first time that anyone can […]
read more
02/05/2023

PCI-DSS: Protecting your card data

Szalárdi Tamás
Historical background The rise of digital banking and credit card transactions has opened up an innovative, forward-looking, but also dangerous dimension that has quickly become an integral part of our everyday lives, both for its convenience and practicality. Today, it is almost impossible to imagine life without online shopping, PayPass, ATM cash withdrawals, but at […]
read more
20/04/2023

Movies to reality: the pros and cons of ChatGPT

Polyák Beatrix
Now that ChatGPT, an artificial intelligence chatbot, is on tap, the sci-fi scenes of self-aware intelligent machines gleefully murdering the protagonist's family and friends, or trying to destroy and enslave all of humanity in a variety of ways, are bound to come to mind. This may be one of the reasons why people are sceptical […]
read more
06/04/2023

Risk Assessment in Operational Technology – The most common risks and how to avoid them

Hüvelyes Péter
First used in 2006 by Gartner, the term ‘operational technology’, or OT for short, is meant to talk about hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes, and events. As OT is closely associated with critical infrastructures such as utility control systems, cybersecurity […]
read more
13/03/2023

All you need to know about TISAX

Hüvelyes Péter
The background to the creation of TISAX The way businesses operate has been radically transformed in recent decades, with a huge increase in their dependence on IT. It is now unimaginable that a company does not use IT systems in almost any aspect of its operations. Its technical support requires an ever-increasing IT capacity, an […]
read more
14/02/2023

Digital Operational Resilience Act (DORA)

Hüvelyes Péter
Brief Background The digitisation of the financial sector and paralelly its exposure is ever increasing. To date, different financial supervisors across the EU have addressed ICT risks in different ways and with different levels of effectiveness. EU Regulation 2022/2554 on digital operational resilience for the financial sector, officially known as the Digital Operational Resilience Act […]
read more
11/02/2023

Steps for NIS 2 compliance

Tamás Tóth
Following our previous articles on the NIS 2 Directive (hereafter: directive), in the next part of article series we will give you some practical advice on how to prepare for compliance. As you know, the deadline for transposition of the Directive into national law is October 2024, but there is no news yet on which […]
read more
1 2 3 4
crossmenu