vCISO – more IT Security through customizable support
vCISO - External expertise for more IT Security A virtual Chief Information Security Officer improves IT security, offers manpower flexibility and cost efficiency. The vCISO’s responsibilities range...
View ArticleHow Preferred Access Management increases security
Privileged Access Management - greater security for key users PAM increases IT security through the constant monitoring of sensitive data and just-in-time and just-enough restriction of access rights....
View ArticleNIS2 & ISO/IEC 27001:2022: New controls to fulfill both standards
NIS2 Compliance through Implementation of ISO/IEC 27001:2022 NIS2 sets out numerous requirements for managing cyber risks. This is intended to protect network and information systems, their users and...
View ArticleThreat Intelligence – Knowledge is power & security
Threat Intelligence (TI), also known as Cyber Threat Intelligence (CTI), provides detailed and actionable information to help companies and organizations prevent and combat cyber security threats. TI...
View ArticleBiometrics – better security without passwords?
Biometrics - security almost without password Identification systems based on biometric data offer a good combination of security and convenience. When introducing biometric systems, increased...
View ArticleDevOps security: Stress test for culture and technology
With DevOps, software development (Dev) and operations (Ops) grow together. Tools for process automation, continuous integration and teamwork between Dev and Ops units promote the efficiency of the...
View ArticleWorkload Security with SASE, this is how it works
In IT, workload stands for the ” processing load” that an IT component has to perform, measured in time and computing resources – this starts with a simple database and ends with complex scientific...
View ArticleManaged Services to counter the shortage of manpower
The spectre of a shortage of skilled workers is looming. The baby boomer generation, which makes up the majority of today’s workforce, will soon reach their retirement age. In addition, there are a...
View ArticleISO 27001 Certification without delay
ISO 27001 is a standard of the International Organization for Standardization (ISO). It was published in the revised version ISO/IEC 27001:2022 in October 2022. For companies and public authorities,...
View ArticleFighting AI attacks: How to protect data and systems
Even the most sceptical have realized this by now: There is no way around artificial intelligence. Whether it’s chatbots in customer service, predictive maintenance in industry, fraud detection in...
View ArticleMicrosoft Sentinel as Azure SIEM – Benefits & Costs
Microsoft Sentinel as Azure SIEM - Benefits & Costs Microsoft Sentinel in Azure - what to expect from the SIEM-SOAR combination? Microsoft Sentinel protects the entire IT of SMEs and corporations...
View ArticleGetting a Grip on Cryptography
Getting a Grip on Cryptography Cryptography isn’t usually considered a ‘sexy’ subject in the complex field of cybersecurity. When cryptography is included in an IT security roadmap, it’s often only as...
View ArticleResilience by Identity
Resilience by Identity ‘Resilience’ means a critical entity’s ability to prevent, protect against, respond to, resist, mitigate, absorb, accommodate and recover from an incident. As the overview of new...
View Article