Ask us


I agree to the terms of the Privacy policy
I agree with the provisions on data protection. I agree that Protelion will process the personal data provided by me electronically for the processing of my request and contact me, according to my explicit request, for the processing of my request. I can revoke my consent at any time with effect for the future.

Thank You!

Your request was sent successfully.
We’ll answer you as soon as possible.

OK

Home

/
 ... / 

Resources

/
 ... / 
Blog

Blog

Smart City
18.03.2026
6 min read
A Smart City is a framework predominantly composed of Information and Communication Technologies (ICT) designed to develop, implement, and promote sustainable development practices in order to address the growing challenges of urbanization.
Explore more

More from Our Blog

IIoT: Industrial Internet of Things
04.03.2026
8 min read
Broadly speaking, the Industrial Internet of Things (IIoT) refers to the use of intelligent sensors and actuators in industrial machinery and processes in order to capture information
Explore more
FIM: File Integrity Monitoring
18.02.2026
6 min read
In information security, a Demilitarized Zone (DMZ) is a perimeter local network located between an organization's internal network and an external network, generally the Internet.
Explore more
DMZ: Demilitarized Zone
28.01.2026
6 min read
In information security, a Demilitarized Zone (DMZ) is a perimeter local network located between an organization's internal network and an external network, generally the Internet.
Explore more
Personal Data Protection (Part 2)
16.12.2025
7 min read
Since the General Data Protection Regulation (GDPR) came into force in Europe, many techniques have been used by companies to effectively
Explore more
Personal Data Protection: Encryption
02.12.2025
6 min read
Today, in an increasingly digitalized and connected world, the value of data for an organization — and for the owners of that data — is highly appreciated and indisputable
Explore more
The persistent security crisis in mobile networks: old vulnerabilities keep haunting new generations
21.10.2025
5 min read
This article is based on research «Unveiling the Ghosts of Mobile Networks: When Will Old Bugs Die?»
Explore more
More Blogs