Importance and structure of an ISMS
An information security management system (ISMS) is a systematic approach to managing sensitive information within […]
Importance and structure of an ISMS Read More »
An information security management system (ISMS) is a systematic approach to managing sensitive information within […]
Importance and structure of an ISMS Read More »
We spoke to Dror Davidoff about cloud native application protection platform. Dear Dror Davidoff, could
This week Philipp Pelkmann had an interview with Ben Thornhill, Group Security Manager at Claranet.
Ben Thornhill, Group Security Manager at Claranet, about Pen Testing Read More »
You can download this article at the end with more informations. Several thousand operators of
Attack Detection System in accordance with the IT Security Act 2.0 Read More »
Intro: Cybersecurity is a matter for the chief. Take control of digitization and cybersecurity! This
Cybersecurity ist Chefsache – Der Podcast! with Simeon Mussler Read More »
Web application firewalls (WAFs), also called web application gateways or application/API protection products (WAAPs), are
This week Philipp Pelkmann had an interview with Erik Van Buggenhout, SANS Instructor & Author
Erik Van Buggenhout from NVISO about the MITRE ATT&CK evaluations Read More »
Robert Wortmann: Welcome to a new episode of Breach FM! Today, we have a slightly
“Every 11 minutes a company falls in love with marketing” with Philipp Pelkmann Read More »
Why cyber security is important during Mergers and Acquisitions (M&A)? “Cybersecurity should be a key
Practical guide to a secure Mergers and Acquisitions Read More »
We spoke to Roland Stritt, Vice President Central EMEA at SentinelOne about XDR and MDR.
Roland Stritt, Vice President Central EMEA at SentinelOne about XDR and MDR Read More »
Cybersecurity is a critical concern for organizations, independent of their sizes, operating industries or ecosystems.
Benefits of a comprehensive cybersecurity procurement process Read More »
Identity and access management (IAM) systems in typical enterprise IT environments rely on a chain
Public Key Infrastructure (PKI) for IoT and IIoT device manufacturers Read More »
We recently had the chance to interview senior business development executives from three vendors in
Kaustabh Debbarman Frequently, we have contact to new cybersecurity startups or vendors which would like
Provider Interview with Kaustabh Debbarman, CEO and Co-Founder of LAAVAT Read More »
As the world becomes increasingly connected and reliant on technology, cybersecurity has become a critical
Essential organizational measures and the role of an ISMS Read More »
Cybersecurity has been seen as an inefficient and non-transparent market: more than 7000 vendors, distributors,
More security for your budget: Savings potential in IT security procurement Read More »
The category of IoT product security platforms is relatively new. The solutions are also referred
Considerations for purchasing IoT vulnerability management solutions Read More »