Cloud Cybersecurity – how do meaningful first steps look like?

Cloud security is one of the most important topics to consider and act upon when shifting to the cloud. All the advantages of cloud computing such as scalability, lower ownership costs, and high-speed flexibility break down when a successful cloud cyberattack occurs. This whitepaper will discuss much-needed cloud security capabilities and how different cloud security …

Cloud Cybersecurity – how do meaningful first steps look like? Read More »

How ISO 27001 assessments significantly improve the level of IT security of a company

In an increasingly digital world, data breaches and cybersecurity threats have become a common problem for businesses of all sizes and industries. To mitigate these risks, organizations need to prioritize their security measures. In this article, we will explore how ISO 27001 assessments can significantly increase an organization’s security maturity level. From ISMS to norm, …

How ISO 27001 assessments significantly improve the level of IT security of a company Read More »

The emergency plan – is it just a pile of paper for the drawer or the most important security measure?

Business continuity management (BCM) and emergency planning are important components of the security strategy. It should be standard practice for every company not only to take preventive measures, but also to be prepared for emergencies and to think ahead about decision-making and communication paths. To do this, you should create contingency plans based on templates …

The emergency plan – is it just a pile of paper for the drawer or the most important security measure? Read More »

Password Manager? They all have massive weaknesses anyway. Can they be used in a corporate context at all? What should the CIO look out for?

First of all, we consider password managers to be an indispensable tool for companies to effectively ensure the security and management of passwords. By the way, the BSI also sees it that way and has compiled excellent information on the subject, as it often does. As a CIO, you are faced with the challenge of choosing the …

Password Manager? They all have massive weaknesses anyway. Can they be used in a corporate context at all? What should the CIO look out for? Read More »

Importance and structure of an ISMS

An information security management system (ISMS) is a systematic approach to managing sensitive information within an organization. It is a framework that helps organizations establish, implement, maintain and continuously improve their information security processes. The main objective of an ISMS is to ensure the confidentiality, integrity and availability of information assets while effectively managing risks. …

Importance and structure of an ISMS Read More »

ZTNA & NAC – Tips & tricks for requirement and procurement

Both ZTNA and NAC are about identifying devices and enforcing security policies automatically to ensure that only authorized users can access the resources they need at a given time via secure endpoints. But what tips & tricks are needed for requirements definition and procurement? We highlight various aspects in our whitepaper. Download now and get …

ZTNA & NAC – Tips & tricks for requirement and procurement Read More »

Network Detection and Response (NDR) – Buyer’s Guide

Network Detection and Response (NDR) checks the network metadata (IP flow or netflow) or raw full packet streams for abnormal behavior that violates dynamic threshold values or pre-defined policies. Application layer traffic is deconstructed, compared to a baseline, and analyzed by machine learning algorithms to detect anomalies. But what should be considered when choosing a …

Network Detection and Response (NDR) – Buyer’s Guide Read More »

Web Application Firewalls, DDoS and Botnet Protection: Lessons Learned from Procurement Projects

Web application firewalls (WAFs), also called web application gateways or application/API protection products (WAAPs), are ideal for protecting your own offerings that are accessible from the Internet (such as self-hosted web servers or e-commerce offerings). They are designed to protect against common attack paths such as code injection, cross site scripting, other OWASP security risks …

Web Application Firewalls, DDoS and Botnet Protection: Lessons Learned from Procurement Projects Read More »