Are the giants catching up? Ubiquiti and Huawei grow in the shadow of WLAN market leaders

Although the enterprise WLAN market closed the third quarter of 2025 with solid growth of 7.8%, it is clear that…

New Year’s Eve 2025: Farewell to the year of ransomware, hello to the year of deepfakes

The explosion of generative artificial intelligence capabilities has caused deepfakes to rapidly evolve from a technological curiosity into…

Cyber Security 2026: Why is the integration of IT, OT and IoT inevitable?

The evolution of cyber threats driven by artificial intelligence means that by 2026, the traditional division between office…

DORA, NIS2 and RODO: The end of the ‘handyman’ era in IT

In 2026, IT departments found themselves caught between the pressure to innovate and the crushing weight of new…

NIS2 is not a shopping list for IT. Why is technology alone not enough?

Treating the NIS2 directive solely as a technology shopping list is a strategic mistake that could cost companies…

ServiceNow targets record acquisition. $7bn for IoT security

ServiceNow is preparing for its boldest move in the cybersecurity market, finalizing talks to acquire startup Armis for…

Okta report: Europe lags behind Asia in adoption of modern MFA

Although 70% of employees already use multi-factor authentication, the latest data from Okta reveals a disturbing truth about…

AI hacking AI. Why can companies lose this arms race?

With the rapid integration of artificial intelligence into business processes, a new critical threat has emerged: autonomous models…

Cyber-Paradox: Why does the exponential increase in cyber attacks not translate 1:1 into security industry revenues?

The rapid escalation of cyber threats in Poland is not adequately reflected in the growth rate of the…

The end of the dictates of one model. Cyber security in 2026 will belong to hybrids and pragmatic AI

In 2026, the technical security industry will finally abandon the rigid division between cloud and local infrastructure, opting…

Drowning in alarms: why your SOC needs context, not data

Until recently, the IT industry believed that the key to digital security was collecting every possible byte of…

Phishing 2.0: Why are cyber fraudsters still one step ahead?

Once hackers, now criminal corporations. In the first half of 2025, CERT Polska registered over 100,000 phishing domains.…

Death of reactive defence. Trend Micro: Machines will attack faster than you can blink

By 2026, the cybercrime operating model will undergo a radical transformation, with human hackers being replaced by autonomous…

AI democratises cybercrime. Windows on target for hackers

The arms race in cyberspace has entered a new phase, with artificial intelligence becoming a key ally of…

Palo Alto Networks warns: IT infrastructure replacement by 2029 is inevitable

While the tech industry is caught up in the AI gold rush, the CEO of Palo Alto Networks…

DDoS as a smokescreen. How hackers use chaos to quietly attack APIs and business logic

While headlines scream about record-breaking DDoS attacks exceeding 2 Tbps, the real threat has quietly moved elsewhere. This…

Cyber insurance: partner in crisis or just a payer?

Cyber insurance has become the most sought-after protection product for businesses. Today, companies expect policies to provide not…

Customers aren’t the only ones waiting for Black Friday. Nearly 90 hacking groups are taking aim at e-commerce

The approaching peak of the shopping season promises record revenues for online retailers. At the same time, it…

The slogan: ‘LOUVRE’. How technological debt and years of neglect have put the Louvre at risk

The recent theft of jewels from the Louvre revealed not only physical security gaps, but above all the…

Agent-based AI without governance. The most expensive technology mistake of the decade?

Agent AI promises an operational revolution, but most companies implement it randomly, without real oversight and without measurable…

AI as a weapon, a shield and a risk: How does the CISO need to change its strategy?

Artificial intelligence is no longer just a tool for innovation, but has become a fundamental and complex element…

Companies need AI to reinforce Zero Trust strategy

A new study by DXC Technology and Microsoft shows that although the Zero Trust model is becoming a…