Martin Holovský·Feb 17, 2021Cyber Threat Actors — mapping your adversaryIn this article, which is a starting point in our cybersecurity journey, we will focus on Cyber Threat Actors, on how we can group them, what is their motivation, who is their target and how you can perform threat profiling to map those who…Cta12 min read
Martin Holovský·Dec 17, 2020About Defensive NetworkIn this article, I would like to explain what are the main purposes and reasons for the existence of the Defensive Network. As this will be a long journey I would appreciate any support and feedback from anyone with whom this will resonate. As you might realize, the primary topic…Cybersecurity7 min read