Secure Identities: Current trends
The turn of the year is just a few weeks away – a good time to look back on an eventful 2024. The recent months have been characterized by numerous reports that have brought the topic of cybercrime to...
View ArticleManaged SOC: advantages, costs & finding top providers (checklist)
Managed SOC selection part 1: What a Managed SOC does (with checklist) A Security Operations Center (SOC) is the command center for the cyber defence of companies and organizations. From here, security...
View ArticleFrom 1 April 2025: mandatory reporting of cyberattacks on critical...
From 1 April 2025, operators of critical infrastructure will be obliged to report cyberattacks to the Federal Office for Cybersecurity (Bundesamt für Cybersicherheit, BACS) within 24 hours. This new...
View ArticleHow Resilient Is Your Workplace IT Really?
Imagine this: your systems freeze, critical data vanishes, and employees scramble to regain control. A hacker has just breached your network. Your customers panic, operations grind to a halt, and the...
View ArticleIf Copilot still doesn’t ignite … yet
What’s the matter? Copilot was implemented, but the results do not reflect expectations. After the initial euphoria, usage is stagnating. There can be various reasons for this. First of all, it is...
View ArticleCopilot Usecases: Transforming Business Workflows from Personal to...
The promise of AI is no longer just about automating tasks – it’s about fundamentally reshaping how we work, collaborate, and deliver value. Microsoft Copilot, deeply integrated into the Microsoft 365...
View ArticleDigital Resilience starts with Security by Design – That’s why Managed...
What would happen if your IT systems were to shut down? A cyberattack paralyses your systems, data disappears, communication breaks down. Your customers become restless, projects are delayed, costs and...
View ArticleNIS2, DORA & Co: Aren’t we all part of someone’s relevant supply chain?
The EU’s current cybersecurity regulations have identified a core risk factor in cyber threat scenarios: the supply chain. An increasing number of attacks is carried out indirectly via enterprise...
View ArticleGovernance & Oversharing: How Copilot becomes a Productivity Booster
Few topics are currently discussed as intensely as the secure use of AI in everyday business. Between data protection, regulations, and productivity pressure, many organizations ask: How can we use...
View ArticleRansomware 2.0: How AI is rewriting the rules of Cyber Defence
Artificial intelligence has profoundly changed the world of work, research and cybersecurity. But the same technologies that are designed to protect businesses today are also available to...
View Article