Conflict with Iran and IT sector resilience – How do financial markets forecast broken supply chains?
The escalation of the conflict with Iran is testing the resilience of the IT sector, with financial markets becoming the…
Control Architecture: How NIS2 and Data Act regulations have redefined cloud maturity in 2026
The year 2026 marked the end of the cloud being perceived as an enigmatic hosting space, placing precise…
Lack of staff is no excuse. How do you build enterprise-class cyber security without an army of IT professionals?
Maintaining an efficient security department on your own is no longer just a technical challenge, but a critical…
CISO Hot Chair. Personal responsibility in the age of NIS2 – when digital risk becomes private
The role of CISO is no longer a safe haven for IT experts, transforming into one of the…
NIS2 and AI Act in Poland: Costly obligation or ticket to Western markets?
In January 2026, the grace periods will definitively come to an end, and the market will brutally test…
DORA, NIS2 and RODO: The end of the ‘handyman’ era in IT
In 2026, IT departments found themselves caught between the pressure to innovate and the crushing weight of new…
NIS2 is not a shopping list for IT. Why is technology alone not enough?
Treating the NIS2 directive solely as a technology shopping list is a strategic mistake that could cost companies…
The end of the ‘lone wolf’. The future of cyber security is managed services
The romantic vision of the “lone wolf” in IT is definitely becoming a thing of the past under…
NIS2: chaos and uncertainty in Polish companies. Who does it really cover?
Polish companies are entering the era of regulated cybersecurity, but most are still unsure whether they will be…
How to meet NIS2 requirements? ITAM as the foundation of security
IT asset management is no longer the domain of administrators optimizing licenses, but has become a strategic imperative…
Beyond your own walls: How to secure the digital supply chain?
The days when cybersecurity ended at the edge of your own network are long gone, and today the…
Cyber security is moving from the server room to the boardroom. How do you talk about DORA and NIS2 with your board?
Conversations about cyber security budgets are finally moving from the server room straight into the boardroom. Thanks to…
Cloud in the strategy trap. Why are Polish companies losing out on migration and how to change this?
The cloud computing market in Poland is growing at an impressive rate and analysts forecast further dynamic growth.…
Cyber security is not a sprint. Companies need to stop putting out fires and start planning
The increasing number of cyber attacks, new regulatory obligations and limited human resources make cyber security one of…
Cyber security OT: Why is the industry still standing still?
Despite growing cyber threats and increasing regulatory pressure, the industrial sector continues to delay the integration of cyber…
Segura opens Europe’s first Center of Excellence PAM in Katowice and establishes partnership with Dagma
Managing privileged access is such a complex task that getting the right support in this area should not…
Not just NIS2, or the new cyber security certification regulations
At the beginning of May 2025, a government bill on a national cyber security certification system was submitted…
Sustainability in IT? Only if you don’t lose data in an attack – Dariusz Szwed, Canon
Recent years have seen a sharp rise in cyber threats, with ransomware being one of the most acute.…
