by Alexander | 16 February 2025
Shadow AI is a specific form of shadow IT applied to the field of artificial intelligence.
Shadow AI refers to the use and deployment of artificial intelligence technologies within an organisation without the knowledge, approval or oversight of IT departments or formal management bodies.
by Alexander | 8 October 2024
Shadow IT refers to all IT systems, software solutions, applications and processes used within an organisation without the approval, control or authorisation of the IT department or...
by Alexander | 4 February 2025
A SIEM (Security Information and Event Management) is a cybersecurity software solution that acts as an organisation's security brain.
It collects, standardises and analyses security data from various sources (event logs, security alerts, network data streams, etc.) to detect threats and security incidents in real time.
by Alexander | 31 January 2025
The ISMS, or Information Security Management System, is a structured framework of policies, processes, tools and strategies designed to guarantee the confidentiality, integrity and availability of data within an organisation.
In accordance with ISO 27001, the ISMS provides a systematic approach to preventing cyber threats and mitigating the risks associated with information security.t mitigating the risks associated with information security.
by Alexander | 16 February 2025
SOAR (Security Orchestration, Automation, and Response) is a category of platforms and tools designed to improve the management of cybersecurity operations.
Orchestration: integration and coordination of heterogeneous security tools, systems and processes (e.g. SIEM, EDR, threat intelligence) to centralise their operation.
Automation: Automated execution of repetitive or complex tasks (e.g. analysing alerts, blocking malicious IP addresses) via playbooks (predefined scenarios).
Response: Accelerated management of security incidents, from detection to resolution, using standardised procedures.