Blog

In today's contribution, I would like to focus on data visualization within our ATOM ONE service. Data, information and security are a trend of modern times, and with the arrival of digitization, it is necessary to deal with the data flow, especially with regard to security. For this reason, in my o...

Continue reading...

 
 Daniel Hejda

Are marketing colleagues wondering how to surely get your business on the front pages of newspapers? We have a guaranteed tip for you, how you can help from the ICT department. Get infected with ransomware and don't try to keep it a secret. Ransomware. A reliable way to the front page. You would...

Continue reading...

 

The concept of zero trust has been here for a long time. Is it possible to trust it? When, according to it, nothing can be trusted? Yes. Because we can verify it with practice. Imagine a situation. All users, applications, end devices, and data are somewhere on the Internet. Users do not sit at t...

Continue reading...

 

Nowadays, when it is possible to find a large number of tools and instructions on the open Internet on how to break the security restrictions of a computer and thus take control of it or obtain the credentials of another account, almost anyone can become a hacker. One of such very common utilities i...

Continue reading...