Attack Detection System in accordance with the IT Security Act 2.0
You can download this article at the end with more informations. Several thousand operators of […]
Attack Detection System in accordance with the IT Security Act 2.0 Read More »
You can download this article at the end with more informations. Several thousand operators of […]
Attack Detection System in accordance with the IT Security Act 2.0 Read More »
Intro: Cybersecurity is a matter for the chief. Take control of digitization and cybersecurity! This
Cybersecurity ist Chefsache – Der Podcast! with Simeon Mussler Read More »
Web application firewalls (WAFs), also called web application gateways or application/API protection products (WAAPs), are
This week Philipp Pelkmann had an interview with Erik Van Buggenhout, SANS Instructor & Author
Erik Van Buggenhout from NVISO about the MITRE ATT&CK evaluations Read More »
Robert Wortmann: Welcome to a new episode of Breach FM! Today, we have a slightly
“Every 11 minutes a company falls in love with marketing” with Philipp Pelkmann Read More »
Why cyber security is important during Mergers and Acquisitions (M&A)? “Cybersecurity should be a key
Practical guide to a secure Mergers and Acquisitions Read More »
We spoke to Roland Stritt, Vice President Central EMEA at SentinelOne about XDR and MDR.
Roland Stritt, Vice President Central EMEA at SentinelOne about XDR and MDR Read More »
Cybersecurity is a critical concern for organizations, independent of their sizes, operating industries or ecosystems.
Benefits of a comprehensive cybersecurity procurement process Read More »
Identity and access management (IAM) systems in typical enterprise IT environments rely on a chain
Public Key Infrastructure (PKI) for IoT and IIoT device manufacturers Read More »
We recently had the chance to interview senior business development executives from three vendors in
Kaustabh Debbarman Frequently, we have contact to new cybersecurity startups or vendors which would like
Provider Interview with Kaustabh Debbarman, CEO and Co-Founder of LAAVAT Read More »
As the world becomes increasingly connected and reliant on technology, cybersecurity has become a critical
Essential organizational measures and the role of an ISMS Read More »
Cybersecurity has been seen as an inefficient and non-transparent market: more than 7000 vendors, distributors,
More security for your budget: Savings potential in IT security procurement Read More »
The category of IoT product security platforms is relatively new. The solutions are also referred
Considerations for purchasing IoT vulnerability management solutions Read More »
Remote access solutions for OT environments are purchased either by plant operators, who usually use
Considerations for purchasing OT remote access solutions Read More »
Marcel Lehner Marcel Lehner has been shaping the cyber, information and IT security industry for
Shaping Information Security Together – Experiences of a CISO Read More »
Stefan Würtemberger is Vice President Information Technology at Marabu GmbH & Co KG and member