top of page
Features
![[Watch Now] How the Cyber Resilience Act Prepares You for Future Cybersecurity Challenges](https://static.wixstatic.com/media/6681e7_2bef27f1f1064b4c90845cd74e3259d9~mv2.png/v1/fill/w_293,h_165,fp_0.50_0.50,q_95,enc_auto/6681e7_2bef27f1f1064b4c90845cd74e3259d9~mv2.webp)
[Watch Now] How the Cyber Resilience Act Prepares You for Future Cybersecurity Challenges
Warch now the webinar to explore the EU Cyber Resilience Act, its impact on your business, and steps to ensure compliance and resilience.

Cybersecurity Recap for 2024: Lessons and Insights from South Eastern Europe
Discover key cybersecurity lessons from 2024 in SEE, including ransomware, BEC scams, and strategies for modernizing defenses.


Cybersecurity Predictions for 2025: What Should You Focus On?
Explore the key cybersecurity trends and predictions for 2025 to help organizations stay ahead of emerging threats and strengthen defenses.

Interview - Managing Attack Surface Risks in SMBs and Financial Services
Pro Grupa enhances cybersecurity with Trend Micro’s Vision One. Learn more in this interview hosted by Marko Đorđević.

The Human Element: How to Strengthen Your Email Security Through Awareness and Protection
Discover how Proofpoint's insights can transform your email security approach! Join our upcoming webinar to reduce human-targeted risks!

Trend Micro Vision One - Integrating Proactive and Reactive Cybersecurity
Vision One integrates protection and telemetry from IT/OT elements combined with risk management within a platform approach.

NIS2 - will it make a difference?
Putting risk management at the center of cybersecurity is good news. But NIS2 could easily miss its main goal by focusing on compliance.

In Today’s Digital Landscape: Navigating the Expanding Threat Horizon
Discover how Attack Surface Management (ASM) empowers organizations to proactively navigate today’s expanding threat landscape.

Impersonating Government Agencies To Deliver Infostealers - The HZZO Example
A Croatia-based agency name is spoofed to deliver malware. What if these attacks get more sophisticated, and what can be done in the future?
bottom of page