David Brown, CEO of Countercraft

Interview with David Brown, CEO of Countercraft

David Brown is responsible for all revenue generation processes in the organization. He’s charged with ensuring tight integration and alignment between all revenue-related functions, including Marketing, Sales, customer support, and pricing and revenue management, as well as strategic oversight for long-term profitable revenue generation. An accomplished and enthusiastic sales and business leader with 20+ years’ …

Interview with David Brown, CEO of Countercraft Read More »

Interview with Sascha Levölger from G DATA CyberDefense

As a Business Owner Business Solutions, Sascha Levölger has been responsible for expanding cyber defense solutions for business customers and developing new offerings to market maturity since 2020. He is familiar with current IT security trends and uses them to derive needs-based offerings for his target group, with the aim of strengthening G DATA’s economic …

Interview with Sascha Levölger from G DATA CyberDefense Read More »

Provider Directory Interview with Matthias Helfricht, Director Sales Germany & Austria at Kudelski Security

We got to know Matthias Helfricht from Kudelski Security at the beginning of 2022 as part of a pilot project for a customer SOC. Since then, we have worked together on many project requests. A project request is usually always an RfP, i.e. a small, focused tender for a security service or product for our …

Provider Directory Interview with Matthias Helfricht, Director Sales Germany & Austria at Kudelski Security Read More »

Security Awareness 2.0 – the whitepaper to the market study 2023

The role of individuals in defending against cyber risks is a crucial factor. Raising employee awareness remains one of the most critical responsibilities for IT managers and security officials. Specialised providers have made it their objective to deliver effective learning platforms and design trainings that take into account people’s decreasing attention spans. Security training is …

Security Awareness 2.0 – the whitepaper to the market study 2023 Read More »

Cloud Cybersecurity – how do meaningful first steps look like?

Cloud security is one of the most important topics to consider and act upon when shifting to the cloud. All the advantages of cloud computing such as scalability, lower ownership costs, and high-speed flexibility break down when a successful cloud cyberattack occurs. This whitepaper will discuss much-needed cloud security capabilities and how different cloud security …

Cloud Cybersecurity – how do meaningful first steps look like? Read More »

How ISO 27001 assessments significantly improve the level of IT security of a company

In an increasingly digital world, data breaches and cybersecurity threats have become a common problem for businesses of all sizes and industries. To mitigate these risks, organizations need to prioritize their security measures. In this article, we will explore how ISO 27001 assessments can significantly increase an organization’s security maturity level. From ISMS to norm, …

How ISO 27001 assessments significantly improve the level of IT security of a company Read More »

The emergency plan – is it just a pile of paper for the drawer or the most important security measure?

Business continuity management (BCM) and emergency planning are important components of the security strategy. It should be standard practice for every company not only to take preventive measures, but also to be prepared for emergencies and to think ahead about decision-making and communication paths. To do this, you should create contingency plans based on templates …

The emergency plan – is it just a pile of paper for the drawer or the most important security measure? Read More »

Password Manager? They all have massive weaknesses anyway. Can they be used in a corporate context at all? What should the CIO look out for?

First of all, we consider password managers to be an indispensable tool for companies to effectively ensure the security and management of passwords. By the way, the BSI also sees it that way and has compiled excellent information on the subject, as it often does. As a CIO, you are faced with the challenge of choosing the …

Password Manager? They all have massive weaknesses anyway. Can they be used in a corporate context at all? What should the CIO look out for? Read More »

Importance and structure of an ISMS

An information security management system (ISMS) is a systematic approach to managing sensitive information within an organization. It is a framework that helps organizations establish, implement, maintain and continuously improve their information security processes. The main objective of an ISMS is to ensure the confidentiality, integrity and availability of information assets while effectively managing risks. …

Importance and structure of an ISMS Read More »