by Petra | Apr 8, 2025 | Use Case
Recovering from a cyberattack is a high-stakes process for any IT organisation. After an incident such as ransomware or malware infections, restoring systems from backup is often the quickest way to regain operational stability. However, blindly restoring backups...
by Petra | Apr 2, 2025 | Use Case
Portals are often used both for external and internal sharing and collecting of various types of information. Such portals are natural hubs between potentially large numbers of different parties and therefore present an effective attack vector for spreading malicious...
by Petra | Jan 15, 2025 | Blog
To remain efficient and secure, systems must be updated regularly. For secure production environments, updates can also pose a risk of malware entering the systems. To make sure the update import is secure, special solutions are needed. A challenge to import software...
by Petra | Oct 15, 2024 | Use Case
To remain efficient and secure, systems must be updated regularly. For secure production environments, updates can also pose a risk of malware entering the systems. To make sure the update import is secure, special solutions are needed. Importing software updates...
by Petra | Aug 30, 2023 | Use Case
The need to connect IT and OT has grown with the digitalisation of production processes. Buthow do you secure this information flow and avoid exposing your systems to cyberattacks? Secure information flow in an IT/OT environment It has become increasingly important to...