Quantcast
Channel: SITS
Browsing all 13 articles
Browse latest View live

vCISO – more IT Security through customizable support

vCISO - External expertise for more IT Security A virtual Chief Information Security Officer improves IT security, offers manpower flexibility and cost efficiency. The vCISO’s responsibilities range...

View Article


How Preferred Access Management increases security

Privileged Access Management - greater security for key users PAM increases IT security through the constant monitoring of sensitive data and just-in-time and just-enough restriction of access rights....

View Article

NIS2 & ISO/IEC 27001:2022: New controls to fulfill both standards

NIS2 Compliance through Implementation of ISO/IEC 27001:2022 NIS2 sets out numerous requirements for managing cyber risks. This is intended to protect network and information systems, their users and...

View Article

Threat Intelligence – Knowledge is power & security

Threat Intelligence (TI), also known as Cyber Threat Intelligence (CTI), provides detailed and actionable information to help companies and organizations prevent and combat cyber security threats. TI...

View Article

Biometrics – better security without passwords?

Biometrics - security almost without password Identification systems based on biometric data offer a good combination of security and convenience. When introducing biometric systems, increased...

View Article


DevOps security: Stress test for culture and technology

With DevOps, software development (Dev) and operations (Ops) grow together. Tools for process automation, continuous integration and teamwork between Dev and Ops units promote the efficiency of the...

View Article

Workload Security with SASE, this is how it works

In IT, workload stands for the ” processing load” that an IT component has to perform, measured in time and computing resources – this starts with a simple database and ends with complex scientific...

View Article

Managed Services to counter the shortage of manpower

The spectre of a shortage of skilled workers is looming. The baby boomer generation, which makes up the majority of today’s workforce, will soon reach their retirement age. In addition, there are a...

View Article


ISO 27001 Certification without delay

ISO 27001 is a standard of the International Organization for Standardization (ISO). It was published in the revised version ISO/IEC 27001:2022 in October 2022. For companies and public authorities,...

View Article


Fighting AI attacks: How to protect data and systems

Even the most sceptical have realized this by now: There is no way around artificial intelligence. Whether it’s chatbots in customer service, predictive maintenance in industry, fraud detection in...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Sentinel as Azure SIEM – Benefits & Costs

Microsoft Sentinel as Azure SIEM - Benefits & Costs Microsoft Sentinel in Azure - what to expect from the SIEM-SOAR combination? Microsoft Sentinel protects the entire IT of SMEs and corporations...

View Article

Image may be NSFW.
Clik here to view.

Getting a Grip on Cryptography

Getting a Grip on Cryptography Cryptography isn’t usually considered a ‘sexy’ subject in the complex field of cybersecurity. When cryptography is included in an IT security roadmap, it’s often only as...

View Article

Image may be NSFW.
Clik here to view.

Resilience by Identity

Resilience by Identity ‘Resilience’ means a critical entity’s ability to prevent, protect against, respond to, resist, mitigate, absorb, accommodate and recover from an incident. As the overview of new...

View Article

Browsing all 13 articles
Browse latest View live