Blog

Quantum Security: The AI Revolution

The rapid evolution of both quantum computing and artificial intelligence (AI) presents humanity with incredible opportunities, but also introduces significant challenges to our digital security landscape, particularly the public key encryption that underpins our modern world. For years, complex mathematical formulas have been the bedrock of cryptography. However, the convergence of AI and quantum computing […]

Blog

Why Zero Trust is Essential Security

With Zero Trust, users can access only the approved applications, systems, or specific resources they need, when they need them. Think about your network security. Is it like throwing an open house party, leaving your business exposed? What do your security measures and a house party have in common?   The Danger of ‘Trust at […]

Blog

AI’s Rapid Rise: Understanding LLM Vulnerabilities

See what the OWASP Foundation’s top 10 vulnerabilities are for large language models. The AI explosion, fueled by large language models (LLMs), has sparked both excitement and concern. To address potential risks, OWASP Foundation has outlined the top 10 vulnerabilities facing LLMs. Let’s break them down: Prompt Injection: Attackers can manipulate LLMs through carefully designed prompts. […]

Blog

Security Training: Your Best Defense

By providing employees with the training and knowledge to recognize phishing and social engineering attacks, businesses can strengthen their security posture, significantly reduce human error, and stay ahead of evolving threats. We can always count on people making mistakes. While most of our mistakes do not significantly affect our lives, some, even minor, everyday errors […]

Blog

Europe’s Blackout: The Need for Physical Network Control

Golden button: To better protect ourselves, we need to think beyond computer security. We need ways to physically control our network connections. On April 28th, 2025, something big and scary happened in Europe. The lights went out across Spain and Portugal. This blackout wasn’t just a small problem – it was huge, one of the […]

Blog

Cybersecurity Overkill: Less Can Be More

Beware: Believing that having sophisticated cybersecurity tools in place is enough leads to a precarious false sense of security. Even for SMBs. We often equate having more with being safer, a comforting thought that extends even to the complex world of cybersecurity. The idea that a larger arsenal of cybersecurity tools automatically translates to stronger […]

Blog

Addressing the Challenges of Inefficient Channel Management

Two out of three SMBs are likely or very likely to switch vendors or MSSPs after a negative experience. MSSPs simply can’t afford unhappy SMB owners because their cybersecurity platform or MDR isn’t manageable enough. Many Managed Service Providers (MSPs) find themselves grappling with increasingly inefficient methods of managing their diverse channel customers. The experience […]

Blog

Law Firms at Risk: Time to Strengthen Cybersecurity

Law firms are prime targets for cybercriminals — and many still aren’t taking the threat seriously enough. With access to vast amounts of sensitive client information, from personal details to financial data, law firms are a goldmine for hackers. The legal sector continues to top the charts for data breaches, with a staggering 86% of incidents involving […]

News

Mitja Trampuž presents the state of the art in the use of artificial intelligence in cybersecurity

In Budva, the Association of Security Managers of Montenegro organized the conference “Security without compromise”, which addressed the current challenges of regional companies in the field of corporate security. Mitja Trampuž, CEO at CREAPLUS, and President of the AI4SI initiative and Vice president of the Section for Cyber Security, which operate within the Association for Informatics and Telecommunications […]