News

FENEK team became one of the winners of the challenge in the “MACHINE OFFENSE 2.0” hackathon

FENEK team became one of the winners of the challenge in the “MACHINE OFFENSE 2.0” hackathon

The Ministry of Defense of Ukraine held a large-scale technological hackathon “MACHINE OFFENSE 2.0”, in which more than 50 teams of…

Octava Defence presented its developments at the ASIS EUROPE 2024 conference

Octava Defence presented its developments at the ASIS EUROPE 2024 conference

Octava Defence, a company of Octava Capital Group, became the first Ukrainian company to present its technological and software solutions to…

Defensible Networks

Defensible Networks

The term Defensible Network Architecture (DNA), was first introduced by cybersecurity expert Richard Bejtlich in 2004 in his book The Tao…

11 SOC strategies from MITRE. Roadmap for thoughtful work of Ukrainian CISOs

11 SOC strategies from MITRE. Roadmap for thoughtful work of Ukrainian CISOs

The latest research shows that more than half of all existing cyber security incident response centres are considered ineffective in the…

How to measure the reliability of a cyber security system

How to measure the reliability of a cyber security system

Oleksii Sevonkin, BDM at Octava Defence, will help you understand the skills that a system must have to be considered cyber-resilient…

8 signs of a reliable cyber security partner that CISOs rely on

8 signs of a reliable cyber security partner that CISOs rely on

Cyber security managers around the world are changing the way they operate, looking towards a more mature cyber security landscape. Their…

Cyber resilience of a large business

Cyber resilience of a large business

Oleksandr Atamanenko, CISO of Octava Group, about cyber security strategy for holding structures and the role of SOC in its implementation.Being…

Why are technical protections not enough to ensure cyber security?

Why are technical protections not enough to ensure cyber security?

There are 5 reasons, why you CANNOT rely on technology alone to ensure cyber security.1. The cybercrime economy is evolving, which…

David versus Goliath: How MSSP beats the traditional cyber security solution delivery model

David versus Goliath: How MSSP beats the traditional cyber security solution delivery model

No matter what kind of IT and cyber security budget you have, most likely, you, like most, are trying to close…

How SOC helps implement Cyber security Mesh

How SOC helps implement Cyber security Mesh

The rapid evolution and increasing sophistication of cyberattacks, along with the widespread migration of assets to hybrid multi-cloud infrastructures, create a…

FENEK team became one of the winners of the challenge in the “MACHINE OFFENSE 2.0” hackathon

FENEK team became one of the winners of the challenge in the “MACHINE OFFENSE 2.0” hackathon

The Ministry of Defense of Ukraine held a large-scale technological hackathon “MACHINE OFFENSE 2.0”, in which more than 50 teams of…

Security Operations Center (SOC) Octava Defence переходить до системного інтегратора Accord Group

Security Operations Center (SOC) Octava Defence переходить до системного інтегратора Accord Group

«Я переорієнтовую Octava Defence виключно на defence-tech рішення для нашої країни та світу, залишаючи все, що стосується Cyber, в зоні відповідальності…

Octava Defence presented its developments at the ASIS EUROPE 2024 conference

Octava Defence presented its developments at the ASIS EUROPE 2024 conference

Octava Defence, a company of Octava Capital Group, became the first Ukrainian company to present its technological and software solutions to…

“A Fenech desert fox that can hear drones and missiles well.” How the Ukrainian system of early warning of targets “Sphere” works

“A Fenech desert fox that can hear drones and missiles well.” How the Ukrainian system of early warning of targets “Sphere” works

The founder of Octava Defense, Oleksandr Kardakov, announced during iForum the emergence of a unified system for the protection of critical infrastructure objects…

Latest technologies from Ukrainiandevelopers to protect the sky

Latest technologies from Ukrainiandevelopers to protect the sky

Russia has a lot of Shahed kamikaze drones. They are cheap, and can be produced by hundreds each month. At first,…

The power of innovation. Oleksandr Kardakov’s miltech designs strengthen Ukrainian defence sector. How they work

The power of innovation. Oleksandr Kardakov’s miltech designs strengthen Ukrainian defence sector. How they work

Oleksandr Kardakov is an IT businessman, author of the cutting-edge miltech designs, founder of Octava Defence, and Chairman of the Supervisory…

Defensible Networks

Defensible Networks

The term Defensible Network Architecture (DNA), was first introduced by cybersecurity expert Richard Bejtlich in 2004 in his book The Tao…

11 SOC strategies from MITRE. Roadmap for thoughtful work of Ukrainian CISOs

11 SOC strategies from MITRE. Roadmap for thoughtful work of Ukrainian CISOs

The latest research shows that more than half of all existing cyber security incident response centres are considered ineffective in the…

How to measure the reliability of a cyber security system

How to measure the reliability of a cyber security system

Oleksii Sevonkin, BDM at Octava Defence, will help you understand the skills that a system must have to be considered cyber-resilient…

8 signs of a reliable cyber security partner that CISOs rely on

8 signs of a reliable cyber security partner that CISOs rely on

Cyber security managers around the world are changing the way they operate, looking towards a more mature cyber security landscape. Their…