CYBER SECURITY

Penetration Testing – Beating The Hackers At Their Own GamePenetration Testing – Beating The Hackers At Their Own Game

Penetration Testing – Beating The Hackers At Their Own Game

A comprehensive security test of individual computers or networks protects companies from hacker attacks. Almost every fifth IT manager has…

3 years ago
Internet Scams And How To Prevent ThemInternet Scams And How To Prevent Them

Internet Scams And How To Prevent Them

No security and foresight measure is superfluous against Internet scams. On a daily basis, the dynamics of your company when…

3 years ago
Authenticate, Authenticate & Authorize: Multi-Factor AuthenticationAuthenticate, Authenticate & Authorize: Multi-Factor Authentication

Authenticate, Authenticate & Authorize: Multi-Factor Authentication

What Is Multi-Factor Authentication? Multi-factor authentication (MFA) is an authentication method that combines multiple credentials - the factors. You know…

3 years ago
Human Weakness: Make Employees Aware Of Data ProtectionHuman Weakness: Make Employees Aware Of Data Protection

Human Weakness: Make Employees Aware Of Data Protection

Many companies know it: In theory, there is a clear rule on how the requirements of the GDPR should be…

3 years ago
Online Training In IT Security: New Awareness Offer For SMEsOnline Training In IT Security: New Awareness Offer For SMEs

Online Training In IT Security: New Awareness Offer For SMEs

Not only are companies navigating better and better in the digital world, but also criminals. This year alone, we were…

4 years ago
Internet Identity Theft: What Is Malware?Internet Identity Theft: What Is Malware?

Internet Identity Theft: What Is Malware?

After looking at phishing and hacking in our Internet Identity Theft series, let's take a closer look at malware today.…

4 years ago
Identity Theft On The Internet: What Is Social Engineering?Identity Theft On The Internet: What Is Social Engineering?

Identity Theft On The Internet: What Is Social Engineering?

In our series on identity theft on the Internet, we are now devoting ourselves to social engineering: the attack method…

4 years ago
Artificial Intelligence & cybersecurity: A Curse And A Blessing At The Same TimeArtificial Intelligence & cybersecurity: A Curse And A Blessing At The Same Time

Artificial Intelligence & cybersecurity: A Curse And A Blessing At The Same Time

Artificial intelligence - in short: AI - has made it from fiction into everyday life: Science benefits from artificial intelligence…

4 years ago
Agile Security: Five Tips For Security ManagersAgile Security: Five Tips For Security Managers

Agile Security: Five Tips For Security Managers

For around three years now, a noticeable paradigm shift has been observed in software development: Instead of the waterfall model,…

4 years ago
Simulated Cyber ​​Attacks: Exercises To Protect Against Cyber ​​Risks?Simulated Cyber ​​Attacks: Exercises To Protect Against Cyber ​​Risks?

Simulated Cyber ​​Attacks: Exercises To Protect Against Cyber ​​Risks?

The reason for this is the explosion in cyber threats. More and more IT departments rely on penetration tests or…

4 years ago