Slovak Industry Vision Day 2024: energetika, nové výzvy a príležitosti

Decent Cybersecurity at Slovak Industry Vision Day 2024

On November 21, 2024, Decent Cybersecurity had the privilege of participating in the Slovak Industry Vision Day 2024: Energetics – New Challenges and Opportunities, hosted at the esteemed X-Bionic® Sphere. Our company was represented by Senior IT Consultant Pavol Krcho, PhD., who engaged in insightful discussions on new pressing security challenges and innovative security solutions.…

NCC-SK

Decent Cybersecurity Officially Joins the European Cybersecurity Community

At Decent Cybersecurity, we are excited to announce a significant milestone in our mission to enhance cyber safety across Europe. As of February 4, 2025, Decent Cybersecurity has officially joined the European Cybersecurity Community. We have been recognized as a member of the European Cybersecurity Competence Centre (ECCC) and the Cyber Security Competence and Certification…

NIS2 Implementation Guide: Essential Security Requirements and Controls

Decent Cybersecurity Becomes a Certified Cybersecurity Auditor

Decent Cybersecurity is proud to announce its certification as an certified cybersecurity auditor (“Certifikovaný audítor kybernetickej bezpečnosti”) in Slovakia, effective February 8, 2025. This certification is a significant achievement, aligning our expertise with the latest cybersecurity regulations and reinforcing our commitment to protecting critical infrastructure and essential services. Aligning with EU´s NIS2 Directive and National…

Decent Cybersecurity Engages in National EDF Information Day in Prague

On February 4, 2025, Decent Cybersecurity actively participated in the 2025 National Information Day on the European Defence Fund (EDF) at Hotel DAP, Prague, Czech Republic. Organized by the Defence and Security Industry Association Czech Republic (AOBP) — of which we are now a proud member — and the Ministry of Defence of the Czech Republic,…

PQ React

Decent Cybersecurity Leads Post-Quantum Innovation with PQ-REACT Project Win

In a significant development for European cybersecurity, Decent Cybersecurity has been selected as one of five winners in the prestigious PQ-REACT Open Call #1, marking a crucial step forward in the advancement of post-quantum cryptographic solutions. The company’s CRISP-Q project (Cryptographic Resilience Implementation for Secure Post-Quantum Systems) was chosen for its innovative approach to implementing…

NIST’s New Guidelines for Key-Encapsulation Mechanisms: Preparing for the Post-Quantum Era

The National Institute of Standards and Technology (NIST) has released Special Publication 800-227, a comprehensive framework for implementing and deploying Key-Encapsulation Mechanisms (KEMs). This landmark document arrives at a crucial time as organizations worldwide prepare for the transition to post-quantum cryptography. The guidelines represent a significant milestone in NIST’s post-quantum cryptography standardization process, providing organizations…

Permissioned Blockchain in UAV Operations: Securing the Skies with Distributed Trust

Permissioned Blockchain in UAV Operations: Securing the Skies with Distributed Trust

Introduction Permissioned blockchain technology represents a revolutionary approach to securing UAV operations, providing a controlled, distributed ledger system that enhances security, traceability, and coordination in drone networks. With the potential to reduce data breaches by 90% while improving operational efficiency by 30%, this technology is transforming the landscape of drone operations. System Architecture The permissioned…

“Harvest Now, Decrypt Later” Threat in UAV Operations: Preparing for Future Quantum Risks

Introduction The “Harvest Now, Decrypt Later” threat represents a significant challenge to UAV operations, where adversaries collect encrypted communications today with the intention of decrypting them once quantum computing capabilities become available. This forward-looking threat requires immediate attention and proactive security measures. System Architecture The quantum-resistant security system implements advanced cryptographic protocols through integrated components…

Perfect Forward Secrecy in UAV Operations: Safeguarding Communication for the Long Haul

Perfect Forward Secrecy in UAV Operations: Safeguarding Communication for the Long Haul

Introduction Perfect Forward Secrecy (PFS) represents a critical advancement in UAV communication security, ensuring that session keys remain protected even if long-term secret keys are compromised. This sophisticated approach to cryptographic security provides essential protection for sensitive drone operations and historical mission data. System Architecture The PFS system implements advanced cryptographic protocols through integrated components…

Stress Testing UAVs in Electromagnetically Contested Environments: Ensuring Resilience in Challenging Conditions

Introduction Stress testing UAVs in electromagnetically contested environments involves rigorous evaluation of drone performance under extreme interference conditions. This comprehensive testing approach ensures operational resilience and identifies potential vulnerabilities before deployment in challenging real-world scenarios. System Architecture The testing framework implements sophisticated simulation and evaluation capabilities through integrated components that replicate various electromagnetic interference patterns…