News & Insights

Projects, announcements and insights from the Softline team

Blog

Threat Modeling for Document Workflow Systems: STRIDE in Practice

Securing enterprise document workflow systems requires a structured approach to identifying vulnerabilities. This article explores applying the STRIDE threat modeling framework to…

Blog

Data protection in ERP systems: role-based access and control

Unauthorized access to data in an ERP system can lead to significant financial and reputational losses. Let's explore how an effective role-based…

Blog

Hybrid cloud for government institutions: benefits and limitations

Government institutions face a unique challenge: how to modernize IT infrastructure leveraging cloud technologies without compromising security and sensitive data storage requirements?…

Blog

Electronic document flow in public procurement

Transitioning to electronic document flow in public procurement simplifies interaction with Prozorro and optimizes internal processes, but requires a systematic approach to…

Blog

Integrating legacy systems with microservices for maximum flexibility

Integrating legacy systems with modern microservices in a hybrid cloud allows companies to effectively leverage existing investments while gaining the flexibility and…

Blog

Data protection in hybrid infrastructure

Companies migrating sensitive data to the cloud often face uncontrolled information spread beyond the perimeter. This creates new challenges for DLP systems,…

Blog

API integration of legacy systems: avoiding pitfalls

Integrating legacy systems via API often becomes a complex project. Let's explore common challenges and strategies to avoid them for effective digital…

Blog

Offboarding failures that compromise company cybersecurity

Improper termination of employment can turn a former employee into a potential threat, undermining a company's cybersecurity. The absence of a clear…

Blog

AI phishing: why even cautious employees open malicious emails

Artificial intelligence has radically changed the cybersecurity landscape, making phishing attacks unrecognizable even to experienced users. AI-generated emails now bypass traditional filters…

Have a challenge? Let's discuss

Tell us your situation — we'll prepare a proposal

Schedule a consultation