AHK_PwC Logo

Decent Cybersecurity at AHK Slovakia & PwC Dual-Use Products Event

On February 13, 2025, Decent Cybersecurity had the opportunity to participate in a high-profile event on dual-use products, organized by the German-Slovak Chamber of Industry and Commerce (AHK Slovakia) and PwC. This gathering, called “Financing and Legal Framework for the Production and Trading of Dual-Use Products”, brought together industry leaders, regulatory experts, and financial institutions…

TREND

Decent Cybersecurity Featured in TREND.sk Magazine’s Latest Issue

We at Decent Cybersecurity are honored to be featured in the latest edition of TREND Magazine, Slovakia’s leading business weekly, highlighting our pioneering role in strengthening European cyber defence through cutting-edge AI and post-quantum security innovations. This recognition underscores our commitment to advancing cyber resilience, technological sovereignty, and the protection of critical infrastructure across Europe.…

Slovak Industry Vision Day 2024: energetika, nové výzvy a príležitosti

Decent Cybersecurity at Slovak Industry Vision Day 2024

On November 21, 2024, Decent Cybersecurity had the privilege of participating in the Slovak Industry Vision Day 2024: Energetics – New Challenges and Opportunities, hosted at the esteemed X-Bionic® Sphere. Our company was represented by Senior IT Consultant Pavol Krcho, PhD., who engaged in insightful discussions on new pressing security challenges and innovative security solutions.…

NCC-SK

Decent Cybersecurity Officially Joins the European Cybersecurity Community

At Decent Cybersecurity, we are excited to announce a significant milestone in our mission to enhance cyber safety across Europe. As of February 4, 2025, Decent Cybersecurity has officially joined the European Cybersecurity Community. We have been recognized as a member of the European Cybersecurity Competence Centre (ECCC) and the Cyber Security Competence and Certification…

NIS2 Implementation Guide: Essential Security Requirements and Controls

Decent Cybersecurity Becomes a Certified Cybersecurity Auditor

Decent Cybersecurity is proud to announce its certification as an certified cybersecurity auditor (“Certifikovaný audítor kybernetickej bezpečnosti”) in Slovakia, effective February 8, 2025. This certification is a significant achievement, aligning our expertise with the latest cybersecurity regulations and reinforcing our commitment to protecting critical infrastructure and essential services. Aligning with EU´s NIS2 Directive and National…

Decent Cybersecurity Engages in National EDF Information Day in Prague

On February 4, 2025, Decent Cybersecurity actively participated in the 2025 National Information Day on the European Defence Fund (EDF) at Hotel DAP, Prague, Czech Republic. Organized by the Defence and Security Industry Association Czech Republic (AOBP) — of which we are now a proud member — and the Ministry of Defence of the Czech Republic,…

PQ React

Decent Cybersecurity Leads Post-Quantum Innovation with PQ-REACT Project Win

In a significant development for European cybersecurity, Decent Cybersecurity has been selected as one of five winners in the prestigious PQ-REACT Open Call #1, marking a crucial step forward in the advancement of post-quantum cryptographic solutions. The company’s CRISP-Q project (Cryptographic Resilience Implementation for Secure Post-Quantum Systems) was chosen for its innovative approach to implementing…

NIST’s New Guidelines for Key-Encapsulation Mechanisms: Preparing for the Post-Quantum Era

The National Institute of Standards and Technology (NIST) has released Special Publication 800-227, a comprehensive framework for implementing and deploying Key-Encapsulation Mechanisms (KEMs). This landmark document arrives at a crucial time as organizations worldwide prepare for the transition to post-quantum cryptography. The guidelines represent a significant milestone in NIST’s post-quantum cryptography standardization process, providing organizations…

Permissioned Blockchain in UAV Operations: Securing the Skies with Distributed Trust

Permissioned Blockchain in UAV Operations: Securing the Skies with Distributed Trust

Introduction Permissioned blockchain technology represents a revolutionary approach to securing UAV operations, providing a controlled, distributed ledger system that enhances security, traceability, and coordination in drone networks. With the potential to reduce data breaches by 90% while improving operational efficiency by 30%, this technology is transforming the landscape of drone operations. System Architecture The permissioned…

“Harvest Now, Decrypt Later” Threat in UAV Operations: Preparing for Future Quantum Risks

Introduction The “Harvest Now, Decrypt Later” threat represents a significant challenge to UAV operations, where adversaries collect encrypted communications today with the intention of decrypting them once quantum computing capabilities become available. This forward-looking threat requires immediate attention and proactive security measures. System Architecture The quantum-resistant security system implements advanced cryptographic protocols through integrated components…