We are delighted and grateful that Microsoft saw and appreciated our innovation and we could not be happier to share this news with you.21. 03. 2017
The threat of attacks from hackers and cyber criminals has been rapidly growing in recent years. Whether viruses, malware, ransomware or targeted APT attacks, their common goal is to get to sensitive data of institutions, private companies and even hospitals.15. 02. 2017
Hrozba útokov hackerov a kybernetických zločincov posledné roky prudko rastie. Či už ide o vírusy, malware, ransomware alebo cielené APT útoky, ich spoločným cieľom je dostať sa k citlivým dátam inštitúcií, súkromných spoločností a dokonca aj nemocníc.03. 01. 2017
Staň sa členom teamu chrániaceho strategický podnik pred hackermi.
Guardians je hra pre študentov IT, ktorých baví kybernetická bezpečnosť a chcú si vyskúšať ochranu podniku na vlastnej koži. Hlavným cieľom hry bude zabrániť hroziacemu útoku v modelovej situácii a predísť tak katastrofe s devastačnými následkami.22. 12. 2016
Our company takes public education in topic of information security very seriously. In Binary Confidence, we are fully aware of the importance of public awareness about information security that leads to the improvement of the overall situation and gives less chances to the criminals.13. 12. 2016
If they tell you that defects in digital infrastructure protection may cause a nationwide blackout, believe it or not, they are not that far from the truth. Our expert analyzed a real case of cyber attack on electricity distributor in Ukraine.13. 09. 2016
It is a lovely morning on your casual weekday. You arrive to your office on time and turn on your PC as you always do. While you are taking off your coat, the computer screen pops a message with this rough meaning:28. 06. 2016
Millions of firms are attacked by criminals on a daily basis. Some of them are prepared for cyber-crimes but some are still easy targets for virtual criminals. But why is it that these hackers are only rarely traced and found?01. 06. 2016
In order to remain as good as we can, we need to permanently undertake various trainings and practices. The field of cyber security can in fact be compared to medicine – there is always a need to learn and practice new procedures as the field evolves incredibly fast.13. 02. 2016
This is how we protect you and your data. A well known fact about leaks of sensitive data is that the majority of such malicious activities are led by internal employees. This often includes hacking and system compromises, but the most critical is data theft.