Blog
Welcome to our blog. We are regularly sharing our cyber security insights and company updates.
EN 18031 & RED Cybersecurity: Key Steps for 2025 Compliance
Cyber threats targeting connected devices have become a stark reality for every industry, and the radio equipment sector is no
Read moreISO 27001 Implementation: Comprehensive Guide
In this post, we present a comprehensive guide on ISO 27001 implementation for companies: key steps/resources to establish an efficient...
Read moreNavigating the European Cyber Resilience Act (CRA): Essential Compliance Guide for Tech Companies
The European Cyber Resilience Act (CRA) is transforming the cybersecurity landscape for hardware and software products in the European Union.
Read moreKubernetes Security Best Practices and Challenges
Kubernetes powers a variety of modern applications. We can even say it has become the de facto standard for container
Read moreGCP/Kubernetes/Web pentest for e-publishing SaaS
Superlocal is a product of Innocode, a company specializing in developing innovative digital solutions for media and publishing aimed at...
Read moreEnhancing Security for QEPR’s GPS Keyfob System
QEPR specializes in innovative loss prevention solutions, offering technology to protect personal items from being lost or stolen. Their flagship...
Read morePentesting and Security enhancement for Lemberg Solutions
Lemberg Solutions is an IoT and software development company with over 200 employees. Specializing in developing complex IoT solutions, they...
Read moreISO 27001 guided implementation for OpenSocial
OpenSocial is a company specializing in building community software for leading organizations such as the United Nations, Greenpeace International, the...
Read moreUnderstanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques
ConfuserEx2 is a powerful open-source .NET binary obfuscator that offers a range of features from string encryption to anti-tampering and
Read more