Companies invest more in IT security
Itsecurity placeholder

( Source: www.all-about-security.de )
» Read more
Interview
"Cyberattacks are an opportunity in themselves."
Thumb fire and water 2354583 1280

German companies and decision-makers are still hesitant when it comes to the digital transformation of their businesses. Especially in an international comparison, Germany is lagging behind. Innovations are only implemented when an (international) proof of concept has been provided. Where does this hesitation come from? 

Neff: I don't quite share this opinion in practice. Often it is not obvious to the outside world in which stages the digital transformation is taking place. The big success is still the unachieved goal, but many sub-areas - even those of the public sector - are...

» Read more
Hacker group penetrates mobile phone databases
Itsecurity placeholder

( Source: www.sueddeutsche.de )
» Read more
Businesses and government agencies take lessons in cybersecurity
Itsecurity placeholder

( Source: www.tagesspiegel.de )
» Read more
Roaming improves IT security for international travellers
Itsecurity placeholder

( Source: www.presseportal.de )
» Read more
KRITIS brings about improvements in the IT security of critical infrastructures
Itsecurity placeholder

( Source: www.it-daily.net )
» Read more
Practical Advise
These Are The Different Types of Penetration Testing
Thumb pentesting

Penetration testing, pen-testing or ethical hacking are names given to the process of checking the vulnerability of a network, a computer system of a web-based application. In this era where cybercrimes have escalated, systems need to stay guarded and all loopholes sealed. There is no better way to do this other than thinking like a cyber attacker. Pen testing can either be done manually by qualified personnel or automatically by the use of a software application. The following are the different types of pentesting between which you can choose:

 

Targeted Penetration Testing

A...

» Read more
Studie
Gemalto Global Cloud Data Security Study: The Cloud As A Risk?!
Thumb cloudx

Many european countries have always focused on protecting the assets stored in their corporate clouds. One of these is UK and Germany. However, the United Kingdom now seems to fall behind. This is according to the recent study that Gemalto, a digital security company, has conducted. 

 

Data Privacy and Protection

The need to regulate data in the cloud has continually been dire since customer information and payment information among other vital information are always at stake, because of their high level of sensitivity. Hence, many companies have...

» Read more
News
Meltdown & Spectre: The Two Bugs that Can Penetrate Your Processor
Thumb sicherheitslu%cc%88cke

Processors are designed to protect the most sensitive memory part of billions of computers. So what happens, if the processor can no longer accomplish this task? Recent research conducted by Google's Project Zero Team indicates that two primary flaws are affecting modern computers running on Intel, AMD, and ARM processors.

The flaws which are now referred to as Meltdown and Spectre work by isolating untrusted computer programs from accessing some processes on the device or the deep layers of the OS where sensitive information is stored. Hackers are only required to run a certain...

» Read more
Practical Advice
4 Measurements to protect your business from ransomware attacks
Thumb ransomware3

Ransomware has been a dangerous threat to many small and large businesses for over six years now. Unfortunately, this type of cybercrime isn’t going away, but it can be prevented. Here are some tips on how you can protect your business from ransomware attacks. 

 

1. Update your computer system regularly

Cyber criminals usually find it easier to attack older versions of operating systems and browsers. However, if you keep all your business computers constantly updated, hackers will be less prepared to attack them as they won’t be able to figure out how to compromise the...

» Read more