top of page
Jakob Premrn
Jun 2, 20245 min read
The Shield Within: Understanding Windows 11's Hardware Security Features
Having explored the application, identity, and password security features of Windows 11 in the first part of our journey, we now venture...
46 views0 comments
Jakob Premrn
Apr 29, 20245 min read
Unlocking the Secrets of Windows 11's Built-in Security
In today's rapidly evolving digital landscape, the emergence of new security risks necessitates organizations to adopt robust security...
21 views0 comments
Jakob Premrn
Dec 9, 20235 min read
Unmasking the Impact of LLM Models on Phishing Attacks
This blog explores the influence of LLM (Large Language Model) models on phishing attacks worldwide. Recently, both the IT community and...
65 views0 comments
Jakob Premrn
Nov 2, 20234 min read
Exploring the Synergy of Zero Trust and Swiss Cyber Security
In an increasingly interconnected digital world, cyber threats have become more sophisticated, persistent, and potentially devastating....
41 views0 comments
Jakob Premrn
May 7, 20234 min read
The Critical Importance of Vulnerability Management and Security Assessments
Article describes why vulnerability management program is important and why organizations must make regular security assessments.
41 views0 comments
Jakob Premrn
Mar 27, 20233 min read
Building a Comprehensive Cybersecurity Plan
Learn how to build a comprehensive cybersecurity plan that encompasses IT solutions, incident response protocols, and the human element.
77 views0 comments
Jakob Premrn
Mar 19, 20232 min read
Windows Firewall – The First Line of Defense
The article describes the importance of Windows Firewall and an example of CVE-2023-23397.
63 views0 comments
Jakob Premrn
Feb 8, 20233 min read
Unmasking the Different Types of Hackers: Their Targets, Stolen Data and Earnings
Cyber-attacks are a growing threat in today's world and are becoming increasingly prevalent. As the saying goes in the cybersecurity...
10 views0 comments
Jakob Premrn
Feb 3, 20232 min read
Zero Trust: A Comprehensive Approach to Cybersecurity
The article describes what Zero Trust is, why organizations should implement it and what challenges they might face.
22 views0 comments
bottom of page