Blog

Welcome to our blog. We are regularly sharing our cyber security insights and company updates.

Content Type
Article
Case Studies
Category
AppSec
Cloud/Container Security
Company updates
Compliance
Howto
Security Research
Uncategorized
Vulnerabilities

EN 18031 & RED Cybersecurity: Key Steps for 2025 Compliance

Cyber threats targeting connected devices have become a stark reality for every industry, and the radio equipment sector is no

Read more

ISO 27001 Implementation: Comprehensive Guide

In this post, we present a comprehensive guide on ISO 27001 implementation for companies: key steps/resources to establish an efficient...

Read more

Navigating the European Cyber Resilience Act (CRA): Essential Compliance Guide for Tech Companies

The European Cyber Resilience Act (CRA) is transforming the cybersecurity landscape for hardware and software products in the European Union.

Read more

Kubernetes Security Best Practices and Challenges

Kubernetes powers a variety of modern applications. We can even say it has become the de facto standard for container

Read more
GCP/Kubernetes/Web pentest for e-publishing SaaS

GCP/Kubernetes/Web pentest for e-publishing SaaS

Superlocal is a product of Innocode, a company specializing in developing innovative digital solutions for media and publishing aimed at...

Read more
Enhancing Security for QEPR’s GPS Keyfob System

Enhancing Security for QEPR’s GPS Keyfob System

QEPR specializes in innovative loss prevention solutions, offering technology to protect personal items from being lost or stolen. Their flagship...

Read more
Pentesting and Security enhancement for Lemberg Solutions

Pentesting and Security enhancement for Lemberg Solutions

Lemberg Solutions is an IoT and software development company with over 200 employees. Specializing in developing complex IoT solutions, they...

Read more
ISO 27001 guided implementation for OpenSocial

ISO 27001 guided implementation for OpenSocial

OpenSocial is a company specializing in building community software for leading organizations such as the United Nations, Greenpeace International, the...

Read more

Understanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques

ConfuserEx2 is a powerful open-source .NET binary obfuscator that offers a range of features from string encryption to anti-tampering and

Read more