top of page


The Shield Within: Understanding Windows 11's Hardware Security Features
Having explored the application, identity, and password security features of Windows 11 in the first part of our journey, we now venture...
Jakob Premrn
Jun 3, 20245 min read
86 views
0 comments


Unlocking the Secrets of Windows 11's Built-in Security
In today's rapidly evolving digital landscape, the emergence of new security risks necessitates organizations to adopt robust security...
Jakob Premrn
Apr 29, 20245 min read
30 views
0 comments


Unmasking the Impact of LLM Models on Phishing Attacks
This blog explores the influence of LLM (Large Language Model) models on phishing attacks worldwide. Recently, both the IT community and...
Jakob Premrn
Dec 9, 20235 min read
68 views
0 comments


Exploring the Synergy of Zero Trust and Swiss Cyber Security
In an increasingly interconnected digital world, cyber threats have become more sophisticated, persistent, and potentially devastating....
Jakob Premrn
Nov 2, 20234 min read
42 views
0 comments


The Critical Importance of Vulnerability Management and Security Assessments
Article describes why vulnerability management program is important and why organizations must make regular security assessments.
Jakob Premrn
May 8, 20234 min read
43 views
0 comments


Building a Comprehensive Cybersecurity Plan
Learn how to build a comprehensive cybersecurity plan that encompasses IT solutions, incident response protocols, and the human element.
Jakob Premrn
Mar 28, 20233 min read
77 views
0 comments


Windows Firewall – The First Line of Defense
The article describes the importance of Windows Firewall and an example of CVE-2023-23397.
Jakob Premrn
Mar 19, 20232 min read
66 views
0 comments


Unmasking the Different Types of Hackers: Their Targets, Stolen Data and Earnings
Cyber-attacks are a growing threat in today's world and are becoming increasingly prevalent. As the saying goes in the cybersecurity...
Jakob Premrn
Feb 8, 20233 min read
10 views
0 comments


Zero Trust: A Comprehensive Approach to Cybersecurity
The article describes what Zero Trust is, why organizations should implement it and what challenges they might face.
Jakob Premrn
Feb 3, 20232 min read
22 views
0 comments
bottom of page