Probably no one will tell you this, but in cybersecurity companies can be divided into two groups. The first group just wants to have some protection in case of an inspection, usually with a small budget. There are many more of these companies. The second group understands that being compliant with GRC standards like NIS2 or DORA is not enough to be truly secure. They know that security is an endless process. It is not about giving guarantees but about doing everything possible to reduce the risk of losing data just step by step from A to Z.
Cybersecurity Architect
SOC and SIEM consultant
Cybersecurity is a never-ending process.
I’ll guide you through it according to GRC.
AV > EDR >
Tool that continuously monitors endpoints (laptops, servers) to detect suspicious activity and enable rapid investigation and containment.
> NDR >
System that inspects network traffic to spot anomalies and malicious behavior, providing visibility and response at the network layer.
> XDR >
Integrated platform unifying endpoint, network, cloud, identity, and email telemetry to deliver centralized detection and automated response.
> SIEM > SOAR
Platform that collects and correlates logs and security events across your environment to detect threats, alert analysts, and support compliance.
NOC
Network Operations Center centralized team that monitors and manages network infrastructure to ensure uptime, performance, capacity, and SLA compliance; handles outages, routing issues, maintenance, and service requests.
SOC
Security Operations Center centralized team that monitors, detects, investigates, and responds to cyber threats across the organization (typically 24/7) using tools like SIEM/EDR/SOAR and established incident response processes.
GRC
Integrated framework aligning governance, risk and compliance (regulatory duties) with business goals; sets accountability and controls, manages risk, and evidences compliance. For example: NIS2, DORA, NIST, ISO27001, RODO, HIPAA, etc.
Why is this site safe?
The site uses Content Delivery Network (CDN) and Web Application Firewall (WAF) technologies. Additionally, the HTTPS protocol prevents information from being transmitted in a way that is easily visible to anyone monitoring the network.
Content Delivery Network (CDN)
Network supported by 335 locations around the world delivers content in about 50 milliseconds to roughly ~95 percent people of the Internet.
Distributed Denial of Service (DDoS)
348 Tbps of CDN network capacity 23 times greater than the largest DDoS attack ever recorded. Supported by Cloudflare.
Web Application Firewall (WAF)
WAF wykorzystuje uczenie maszynowe do automatycznego blokowania pojawiających się zagrożeń w czasie rzeczywistym.
Cooperation
The last 15 years have brought cooperation with many companies - from the largest corporations to small, but each of them has taught me a lot. Below are some of them.