Managed Services to counter the shortage of manpower
The spectre of a shortage of skilled workers is looming. The baby boomer generation, which makes up the majority of today’s workforce, will soon reach their retirement age. In addition, there are a...
View ArticleISO 27001 Certification without delay
ISO 27001 is a standard of the International Organization for Standardization (ISO). It was published in the revised version ISO/IEC 27001:2022 in October 2022. For companies and public authorities,...
View ArticleFighting AI attacks: How to protect data and systems
Even the most sceptical have realized this by now: There is no way around artificial intelligence. Whether it’s chatbots in customer service, predictive maintenance in industry, fraud detection in...
View ArticleMicrosoft Sentinel as Azure SIEM – Benefits & Costs
Microsoft Sentinel as Azure SIEM - Benefits & Costs Microsoft Sentinel in Azure - what to expect from the SIEM-SOAR combination? Microsoft Sentinel protects the entire IT of SMEs and corporations...
View ArticleGetting a Grip on Cryptography
Getting a Grip on Cryptography Cryptography isn’t usually considered a ‘sexy’ subject in the complex field of cybersecurity. When cryptography is included in an IT security roadmap, it’s often only as...
View ArticleResilience by Identity
Resilience by Identity ‘Resilience’ means a critical entity’s ability to prevent, protect against, respond to, resist, mitigate, absorb, accommodate and recover from an incident. As the overview of new...
View ArticleNIS2 & Penetration Tests: Getting Grip on NIS2-compliant Technology
NIS2 focuses on processes that do not work without technology From a formal point of view, the NIS2 Directive primarily addresses processes that are closely linked to the network and information...
View ArticleIdentity meets Resilience
Identity & Access Management overview IAM is the loosely defined collection of functions also known as account and password management. It contains Identity Governance and Administration (IGA),...
View ArticleMicrosoft Entra: Porträt einer vielseitigen Produktfamilie
The digital world is not only highly complex but has also become potentially insecure. Every day, every user is faced with countless decisions regarding whether an online resource, website content or...
View ArticleSecure Identities: Current trends
The turn of the year is just a few weeks away – a good time to look back on an eventful 2024. The recent months have been characterized by numerous reports that have brought the topic of cybercrime to...
View Article