Quantcast
Channel: SITS
Browsing latest articles
Browse All 26 View Live

Image may be NSFW.
Clik here to view.

Secure Identities: Current trends

The turn of the year is just a few weeks away – a good time to look back on an eventful 2024. The recent months have been characterized by numerous reports that have brought the topic of cybercrime to...

View Article


Managed SOC: advantages, costs & finding top providers (checklist)

Managed SOC selection part 1: What a Managed SOC does (with checklist) A Security Operations Center (SOC) is the command center for the cyber defence of companies and organizations. From here, security...

View Article


From 1 April 2025: mandatory reporting of cyberattacks on critical...

From 1 April 2025, operators of critical infrastructure will be obliged to report cyberattacks to the Federal Office for Cybersecurity (Bundesamt für Cybersicherheit, BACS) within 24 hours. This new...

View Article

How Resilient Is Your Workplace IT Really?

Imagine this: your systems freeze, critical data vanishes, and employees scramble to regain control. A hacker has just breached your network. Your customers panic, operations grind to a halt, and the...

View Article

If Copilot still doesn’t ignite … yet

What’s the matter? Copilot was implemented, but the results do not reflect expectations. After the initial euphoria, usage is stagnating. There can be various reasons for this. First of all, it is...

View Article


Copilot Usecases: Transforming Business Workflows from Personal to...

The promise of AI is no longer just about automating tasks – it’s about fundamentally reshaping how we work, collaborate, and deliver value. Microsoft Copilot, deeply integrated into the Microsoft 365...

View Article

Digital Resilience starts with Security by Design – That’s why Managed...

What would happen if your IT systems were to shut down? A cyberattack paralyses your systems, data disappears, communication breaks down. Your customers become restless, projects are delayed, costs and...

View Article

NIS2, DORA & Co: Aren’t we all part of someone’s relevant supply chain?

The EU’s current cybersecurity regulations have identified a core risk factor in cyber threat scenarios: the supply chain. An increasing number of attacks is carried out indirectly via enterprise...

View Article


Governance & Oversharing: How Copilot becomes a Productivity Booster

Few topics are currently discussed as intensely as the secure use of AI in everyday business. Between data protection, regulations, and productivity pressure, many organizations ask: How can we use...

View Article


Ransomware 2.0: How AI is rewriting the rules of Cyber Defence

Artificial intelligence has profoundly changed the world of work, research and cybersecurity. But the same technologies that are designed to protect businesses today are also available to...

View Article
Browsing latest articles
Browse All 26 View Live