Modern IT infrastructure is no longer a closed world of several servers in a single data center. Today, companies combine cloud services, physical data centers, and increasingly, so-called Edge Computing – computing capacities and devices located close to the end user or production process. All this brings new security challenges.

Cyber Security blog
Interesting facts, tips and advice on the topic of cybersecurity
"We have a firewall and antivirus, we're fine." How many times have we heard this? But what if the era of perimeter defense is over and the attackers are inside? Without a deeper understanding of the network, its structure and operations, you are essentially "network blind." And that's a big problem in cybersecurity.
ZERO TRUST: How to proceed step by step?
Zero Trust is a cybersecurity model based on the principle of "never trust, always verify". Zero Trust is not just a trendy phrase these days. It is a reality that responds to the fact that users, data and systems move outside the perimeter. The traditional model of "secure the border and trust the inside" simply does not work anymore...
The field of cybersecurity is undergoing a period of great change. Artificial intelligence (AI) is fundamentally changing the face of cyberattacks. Attackers are using generative AI to create malicious code, convincing phishing, to bypass traditional security measures, or to create increasingly frequent deepfake video and audio scams, in which, for...
Most companies feel like they know their network. There are some diagrams, tables with IP addresses, a few notes in Excel. But the reality is often completely different. Networks develop spontaneously, administrators change, documentation gets old, and new devices, services, and security requirements are added. And the result is usually...
Novicom ADDNET, integrated DDI/NAC, is a unique operational security tool providing complete network visibility, IP address space management and advanced network access security management. The advantage of the DDI (DNS, DHCP, IPAM) solution with integrated NAC (Network Access Control) lies primarily in increased security, automation and...
Good network segmentation, up-to-date documentation, and a well-thought-out network development plan are the foundation of a stable, secure, and high-performance IT infrastructure. These elements help organizations address technical and security challenges and enable them to fully utilize the potential of their IT environment.
Unfortunately, artificial intelligence (AI) is providing cybercriminals with new tools and capabilities that can be exploited to carry out more effective attacks, as we wrote in a previous article on our Novicom Cyber Security blog. This time, we will look at one specific type of cyberattack that combines sophisticated social engineering...
Network security documentation plays an important role in protecting information assets and preventing cyber threats. In larger companies, implementing and maintaining comprehensive network security documents is essential to ensuring the availability, integrity, and confidentiality of data.
Improving enterprise network security: Benefits of 802.1X and Network Access Control (NAC)
In today's digital age, where cyber threats are constantly evolving and improving, it is increasingly important for companies to protect their computer network and data. Technologies such as 802.1X and Network Access Control (NAC) can play a significant role in this, providing advanced security mechanisms for managing network access and identifying...










