Insights

Unsere Artikel zu aktuellen Themen

JOUO Monitoring im Einsatz für NIS2-Compliance

Mit der neuen NIS2-Richtlinie steigen die Anforderungen an das Cyber-Risikomanagement und die Compliance. Unternehmen müssen nicht nur ihre eigenen Systeme schützen, sondern auch alle extern erreichbaren digitalen Assets und die gesamte Angriffsfläche kontinuierlich im Blick behalten – einschließlich Schatten-IT und verwaister Services.

read the article

Rowhammer Attack

When everything has been thought of – except for the "canalization"

read the article

What is OSINT?

Attackers go undetected with Open Source Intelligence

read the article

Cyber Security is a CEO Responsibility

read the article

Success Requires Insight

heuristics provide important clues to organizational weaknesses

read the article

Do not fight alone!

read the article

Security Vulnerabilities Influence the Google Ranking of a Website

read the article

Your Company as a Trojan Horse in the Supply Chain

read the article

Why also small companies get into the line of fire of cyber attacks!

read the article
Showing 1 to 9 of 17