Content filtering: cybersecuritycritical infrastructurenetwork managementartificial intelligenceGDPRoperational technologiesprivileged access managementindustrial cybersecurity
Who do you trust with the keys of your own home?
In an interview for Delo, Head of Cyber Security Matjaž Katarinčič said the most difficult thing to do is to hunt down attackers who present themselves as real system, i.e. authorised users. They have "the keys to the gate", i.e. passwords, as well as the credentials enabling access to the company's applications, systems and network.READ MORE TAKE A LOOK