CREAPLUS presented solutions to strengthen cyber security and resilience at the international conference “S///:TOP konferencija – People Above Technology!” in cooperation with Coro and Stellar Cyber.
Understanding how much your organisation is at risk from stolen login details is the first step in building strong protection. That old saying, “The greatest trick the devil ever played was convincing the world he doesn’t exist,” feels very true in today’s world of computer security.
As cyber threats evolve, ignoring the dark web is no longer an option. CISOs must focus on proactive measures, leveraging dark web monitoring tools to identify and neutralize risks before they escalate. Imagine a hidden marketplace where stolen data, hacked accounts, and malicious tools are traded like everyday goods.
By understanding the “who, what, why, and how” of cyber threats relevant to their specific environment, organisations can significantly improve their ability to prevent, detect, and respond to attacks, ultimately reducing risk and minimizing potential damage. Threat intelligence refers to the information an organisation collects, processes, and analyses to understand the capabilities, intentions, and attack […]
At the international conference “Challenges of Implementing Artificial Intelligence in Enterprises” organized by SRIPGD, the Association for Informatics and Telecommunications, in cooperation with the Slovenian-Croatian Chamber of Commerce and Industry, Mitja Trampuž, President of the AI4SI initiative, presented the state of the art and challenges in the Slovenian economy in the implementation of artificial intelligence. The […]
The Sports Lottery enhanced its information security protocols by migrating encryption keys to Utimaco SecurityServer Se-Series General Purpose HSM hardware security modules. Športna Loterija d.d. is a leading Slovenian provider of sports betting, contributing significantly to the financial sustainability of the Sports Foundation and the Foundation for the Financing of Disabled and Humanitarian Organisations. The main […]
The rapid evolution of both quantum computing and artificial intelligence (AI) presents humanity with incredible opportunities, but also introduces significant challenges to our digital security landscape, particularly the public key encryption that underpins our modern world. For years, complex mathematical formulas have been the bedrock of cryptography. However, the convergence of AI and quantum computing […]
With Zero Trust, users can access only the approved applications, systems, or specific resources they need, when they need them. Think about your network security. Is it like throwing an open house party, leaving your business exposed? What do your security measures and a house party have in common? The Danger of ‘Trust at […]
See what the OWASP Foundation’s top 10 vulnerabilities are for large language models. The AI explosion, fueled by large language models (LLMs), has sparked both excitement and concern. To address potential risks, OWASP Foundation has outlined the top 10 vulnerabilities facing LLMs. Let’s break them down: Prompt Injection: Attackers can manipulate LLMs through carefully designed prompts. […]
By providing employees with the training and knowledge to recognize phishing and social engineering attacks, businesses can strengthen their security posture, significantly reduce human error, and stay ahead of evolving threats. We can always count on people making mistakes. While most of our mistakes do not significantly affect our lives, some, even minor, everyday errors […]