Importance and structure of an ISMS
An information security management system (ISMS) is a systematic approach to managing sensitive information within […]
Importance and structure of an ISMS Read More »
An information security management system (ISMS) is a systematic approach to managing sensitive information within […]
Importance and structure of an ISMS Read More »
We spoke to Dror Davidoff about cloud native application protection platform. Dear Dror Davidoff, could
This week Philipp Pelkmann had an interview with Ben Thornhill, Group Security Manager at Claranet.
Ben Thornhill, Group Security Manager at Claranet, about Pen Testing Read More »
ZTNA & NAC – Tips & tricks for requirement and procurement Both ZTNA and NAC
ZTNA & NAC – Tips & tricks for requirement and procurement Read More »
Network Detection and Response (NDR) – Buyer’s Guide Network Detection and Response (NDR) checks the
Network Detection and Response (NDR) – Buyer’s Guide Read More »
You can download this article at the end with more informations. Several thousand operators of
Attack Detection System in accordance with the IT Security Act 2.0 Read More »
Intro: Cybersecurity is a matter for the chief. Take control of digitization and cybersecurity! This
Cybersecurity ist Chefsache – Der Podcast! with Simeon Mussler Read More »
Web application firewalls (WAFs), also called web application gateways or application/API protection products (WAAPs), are
This week Philipp Pelkmann had an interview with Erik Van Buggenhout, SANS Instructor & Author
Erik Van Buggenhout from NVISO about the MITRE ATT&CK evaluations Read More »
Robert Wortmann: Welcome to a new episode of Breach FM! Today, we have a slightly
“Every 11 minutes a company falls in love with marketing” with Philipp Pelkmann Read More »
Why cyber security is important during Mergers and Acquisitions (M&A)? “Cybersecurity should be a key
Practical guide to a secure Mergers and Acquisitions Read More »
We spoke to Roland Stritt, Vice President Central EMEA at SentinelOne about XDR and MDR.
Roland Stritt, Vice President Central EMEA at SentinelOne about XDR and MDR Read More »
Cybersecurity is a critical concern for organizations, independent of their sizes, operating industries or ecosystems.
Benefits of a comprehensive cybersecurity procurement process Read More »
Cybersecurity roadmap – what topics do you need to consider? What budgets and lead times
Identity and access management (IAM) systems in typical enterprise IT environments rely on a chain
Public Key Infrastructure (PKI) for IoT and IIoT device manufacturers Read More »
We recently had the chance to interview senior business development executives from three vendors in
EDR/XDR: How to find the right solution for the protection of your endpoints Today, providers’
EDR/XDR: How to find the right solution for the protection of your endpoints Read More »