Understanding Microsoft 365 Threat Intelligence and Using It Productively

Understanding Microsoft 365 Threat Intelligence and Using It Productively

With Microsoft 365 Defender and Threat Intelligence, admins of the Microsoft cloud solution can stay on top of the security of users and contained resources and successfully detect, prevent and defend against threats. The article shows the capabilities and features of the security solution. Microsoft 365 Defender is the central entry point when it comes …

Understanding Microsoft 365 Threat Intelligence and Using It Productively Read More »

What is SECAM (Security Assurance Methodology)?

What is SECAM Security Assurance Methodology

Security Assurance Methodology is a framework developed by the 3rd Generation Partnership Project (3GPP) to assure and evaluate the security of network products used in the mobile communications sector. An important partner in the development and implementation of the framework is the GSM Association (GSMA). SECAM provides general, testable security requirements and security properties for …

What is SECAM (Security Assurance Methodology)? Read More »

Analytics Make Supply Chain Security More Robust

Security analytics technology is becoming increasingly important to supply chain management. Analytics technology has become essential to many aspects of enterprise management. Some of the benefits of analytics even overlap with others. More companies than ever are using analytics to improve their security. They are also using data analytics tools to streamline many logistical processes …

Analytics Make Supply Chain Security More Robust Read More »

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

The question from the headline is probably asked by every IT today. There are simple answers: “not at all”, “de-network / reduce dependency on IT” and “buy new tools”. Unfortunately, the same is true here as with many other complex issues: There is no quick easy solution (“silver bullet”). But there is a proven, three-step …

How to Defend Against Cybercrime Groups with Million-Dollar Budgets? Read More »

Implement Zero-Trust and Zero-Knowledge Security

Zero-Trust and Zero-Knowledge Security

Distributed work requires remote monitoring and management of IT infrastructure. So you can protect every user on every device across the enterprise with modern privileged access management. The massive shift to distributed working creates new challenges for IT and DevOps teams, forcing them to monitor and manage infrastructure remotely. IT and DevOps workers need a …

Implement Zero-Trust and Zero-Knowledge Security Read More »

AIOps and Machine Learning: The Secret Recipe for Observability

AIOps and Machine Learning: The Secret Recipe for Observability

Traditional monitoring aggregates and displays data. When problems occur, traditional monitoring generates alerts. And there can be a lot of them. Some alerts are essential, but others just distract from important information. Filtering out these unimportant alerts is therefore essential. Time for Observability! Complex IT infrastructures leverage microservice architectures, and it’s critical that tech professionals …

AIOps and Machine Learning: The Secret Recipe for Observability Read More »

What Does Network Security Mean?

What Does Network Security Mean?

Network security not only ensures secure networking within companies but also plays a central role in connecting mobile users, for the Internet of Things (IoT), and for cloud computing. What does network security mean? Network security refers to all technical and organizational measures designed to ensure the confidentiality, integrity, and availability of data and systems …

What Does Network Security Mean? Read More »

What Are Virus Scanners?

What Are Virus Scanners?

An antivirus program protects computers from malicious software. This can be, for example, Trojans, worms or spyware, and other malware. Antivirus software is able to detect, block and remove malicious software. What are virus scanners? Basically, virus scanners, often called malware scanners, can be divided into different types depending on their function. Commonly used is …

What Are Virus Scanners? Read More »

OPNsense As a Professional Open Source Firewall

OPNsense As a Professional Open Source Firewall

IT projects based on open source have been gaining popularity for several years now, including OPNsense as a central firewall solution for companies. The growing community and the independent adaptability make OPNsense a future-proof alternative to commercial solutions. Thanks to many plugins, OPNsense is worth a closer look, especially for SMEs. OPNsense As a Professional …

OPNsense As a Professional Open Source Firewall Read More »

What is KMIP (Key Management Interoperability Protocol)?

What is KMIP (Key Management Interoperability Protocol)?

The Key Management Interoperability Protocol is a protocol standardized by OASIS (Organization for the Advancement of Structured Information Standards). KMIP enables the communication of applications and systems for the storage and management of keys, certificates, or other secret objects. What is KMIP (Key Management Interoperability Protocol)? The abbreviation KMIP stands for Key Management Interoperability Protocol …

What is KMIP (Key Management Interoperability Protocol)? Read More »

What Is Home Office?

What Is Home Office?

Homeoffice is a form of telework that can be performed as telecommuting or alternating telecommuting. The work is performed completely or partially from private premises. Contact with the company, colleagues, or customers takes place via telephone, e-mail, and other Internet services. The IT and communications equipment required is a telephone, PC or laptop, and an …

What Is Home Office? Read More »

What is Metasploit?

What is Metasploit

Metasploit is an open-source project that provides, among other things, the Metasploit framework. It contains a collection of exploits that can be used to test the security of computer systems. Metasploit can also be misused as a tool for hackers. What is Metasploit? The framework provided by the Metasploit open-source project can be used to …

What is Metasploit? Read More »

What Is Network Encryption?

what-is-network-encryption

Network encryption operates on layer 2 or 3 of the OSI layer model. It ensures the confidentiality and integrity of transmitted data as well as the authenticity of communication partners and is transparent to higher-layer protocols or applications. What is network encryption? Network encryption encrypts data directly at the network layer. In the OSI layer …

What Is Network Encryption? Read More »

Best Practices for Micro Segmentation

Best Practices for Micro Segmentation

Cloud environments, IT virtualization, and software-defined infrastructure (SDI) are expected to realize key business objectives on the enterprise side, such as scalability, flexible service delivery, and cost-efficiency. Agile IT infrastructures as the foundation for digital transformation inevitably require CIOs and IT leaders to rethink their security strategy. That’s why micro-segmentation is a high priority. Best …

Best Practices for Micro Segmentation Read More »