Aleksander Groshev

Interview with Aleksander Groshev, CEO and Co-Founder of Autobahn Security on automated vulnerability prioritization

How would you describe Autobahn Security in three words? Automated vulnerability prioritization Now please introduce yourself briefly and tell us something about your background. My name is Aleksander Groshev. Together with Karsten Kohl, I am co-founder of Autobahn Security and lead the company as CEO. Before joining Autobahn Security, I worked at Telco Security and …

Interview with Aleksander Groshev, CEO and Co-Founder of Autobahn Security on automated vulnerability prioritization Read More »

NIS2 Richtlinie, NIS2 Reuglierung, NIS2 EU, NIS2 Maßnahmen

NIS2-Directive in CyberInsights

The EU’s new NIS2-Directive addresses many essential aspects of cyber security, from early detection of attacks and establishing trusted identities to proactively responding to incidents and improving awareness and understanding of the intricacies of phishing.It is not just a purely legal requirement, but the foundation for a resilient digital infrastructure in companies and organizations. CyberInsights …

NIS2-Directive in CyberInsights Read More »

Matthias Roehr Advens Managed Detection & Response

Matthias Roehr from aDvens: Managed Detection & Response

Dear Matthias, how would you describe aDvens in 3 quick-witted words? Boldness, Collective, Impact – Our values are not only very important for us as an organization, they also perfectly reflect our understanding of how a client relationship should be. We are helping clients being bold in dealing with their Cybersecurity challenges, we are working …

Matthias Roehr from aDvens: Managed Detection & Response Read More »

Buyer´s Guide: Third Party Cyber Risk Ratings Tools

Buyer’s Guide for Third Party Cyber Risk Ratings Tools

You can download the buyer’s guide at the end of this article. Supply chain risk management for large organizations or operations of critical infrastructure increasingly include cyber risk monitoring. From the suppliers’ perspective, having a shared repository that their customers can access, helps to avoid repetitively answering the same questions about their security controls and …

Buyer’s Guide for Third Party Cyber Risk Ratings Tools Read More »

Frank Sammüller Mimecast Emails und Collaboration Tools

Interview with Frank Sammüller, Sales Director DACH, Mimecast DACH

Hello Frank, can you please introduce yourself briefly, tell us a little about your background and what has been driving you in the cybersecurity environment in recent years? I’ve been “hanging around” in the cyber security market for more than 25 years, have worked in sales for various companies and have now been with Mimecast …

Interview with Frank Sammüller, Sales Director DACH, Mimecast DACH Read More »

Identity Threat Protection

Identity Threat Protection Solutions: Purchasing Guide

Solutions for protecting directory services and identity providers (especially Active Directory Domain Services and Azure AD/Entra) against attacks have been available for several years. These are advertised under various names, in particular Identity Protection, Identity Threat Detection and Response (ITDR) or AD Protection / AD Threat Detection. Some of the solutions are available as standalone …

Identity Threat Protection Solutions: Purchasing Guide Read More »

[Recording] Securing the Future – Managed Services from Endpoint to 24/7 SOC

Thank you for being part of the Securing the Future – Managed Services from Endpoint to 24/7 SOC Event with Bosch CyberCompare on 21.11.2023. On this page you will find a recording of our panel discussion, in which many different questions were discussed with the experts, as well as information about the individual speakers. The …

[Recording] Securing the Future – Managed Services from Endpoint to 24/7 SOC Read More »