Business

Understanding Microsoft 365 Threat Intelligence and Using It Productively

Understanding Microsoft 365 Threat Intelligence and Using It Productively

With Microsoft 365 Defender and Threat Intelligence, admins of the Microsoft cloud solution can stay on top of the security of users and contained resources and successfully detect, prevent and defend against threats. The article shows the capabilities and features of the security solution. Microsoft 365 Defender is the central entry point when it comes …

Understanding Microsoft 365 Threat Intelligence and Using It Productively Read More »

What is SECAM (Security Assurance Methodology)?

What is SECAM Security Assurance Methodology

Security Assurance Methodology is a framework developed by the 3rd Generation Partnership Project (3GPP) to assure and evaluate the security of network products used in the mobile communications sector. An important partner in the development and implementation of the framework is the GSM Association (GSMA). SECAM provides general, testable security requirements and security properties for …

What is SECAM (Security Assurance Methodology)? Read More »

Analytics Make Supply Chain Security More Robust

Security analytics technology is becoming increasingly important to supply chain management. Analytics technology has become essential to many aspects of enterprise management. Some of the benefits of analytics even overlap with others. More companies than ever are using analytics to improve their security. They are also using data analytics tools to streamline many logistical processes …

Analytics Make Supply Chain Security More Robust Read More »

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

The question from the headline is probably asked by every IT today. There are simple answers: “not at all”, “de-network / reduce dependency on IT” and “buy new tools”. Unfortunately, the same is true here as with many other complex issues: There is no quick easy solution (“silver bullet”). But there is a proven, three-step …

How to Defend Against Cybercrime Groups with Million-Dollar Budgets? Read More »

Implement Zero-Trust and Zero-Knowledge Security

Zero-Trust and Zero-Knowledge Security

Distributed work requires remote monitoring and management of IT infrastructure. So you can protect every user on every device across the enterprise with modern privileged access management. The massive shift to distributed working creates new challenges for IT and DevOps teams, forcing them to monitor and manage infrastructure remotely. IT and DevOps workers need a …

Implement Zero-Trust and Zero-Knowledge Security Read More »

AIOps and Machine Learning: The Secret Recipe for Observability

AIOps and Machine Learning: The Secret Recipe for Observability

Traditional monitoring aggregates and displays data. When problems occur, traditional monitoring generates alerts. And there can be a lot of them. Some alerts are essential, but others just distract from important information. Filtering out these unimportant alerts is therefore essential. Time for Observability! Complex IT infrastructures leverage microservice architectures, and it’s critical that tech professionals …

AIOps and Machine Learning: The Secret Recipe for Observability Read More »

What is KMIP (Key Management Interoperability Protocol)?

What is KMIP (Key Management Interoperability Protocol)?

The Key Management Interoperability Protocol is a protocol standardized by OASIS (Organization for the Advancement of Structured Information Standards). KMIP enables the communication of applications and systems for the storage and management of keys, certificates, or other secret objects. What is KMIP (Key Management Interoperability Protocol)? The abbreviation KMIP stands for Key Management Interoperability Protocol …

What is KMIP (Key Management Interoperability Protocol)? Read More »

What Is Home Office?

What Is Home Office?

Homeoffice is a form of telework that can be performed as telecommuting or alternating telecommuting. The work is performed completely or partially from private premises. Contact with the company, colleagues, or customers takes place via telephone, e-mail, and other Internet services. The IT and communications equipment required is a telephone, PC or laptop, and an …

What Is Home Office? Read More »

What is Metasploit?

What is Metasploit

Metasploit is an open-source project that provides, among other things, the Metasploit framework. It contains a collection of exploits that can be used to test the security of computer systems. Metasploit can also be misused as a tool for hackers. What is Metasploit? The framework provided by the Metasploit open-source project can be used to …

What is Metasploit? Read More »

Best Practices for Micro Segmentation

Best Practices for Micro Segmentation

Cloud environments, IT virtualization, and software-defined infrastructure (SDI) are expected to realize key business objectives on the enterprise side, such as scalability, flexible service delivery, and cost-efficiency. Agile IT infrastructures as the foundation for digital transformation inevitably require CIOs and IT leaders to rethink their security strategy. That’s why micro-segmentation is a high priority. Best …

Best Practices for Micro Segmentation Read More »

Privileged Identity Management in Azure AD and Microsoft 365

Privileged Identity Management in Azure AD and Microsoft 365

Privileged Identity Management (PIM) protects resources and user accounts in Azure AD and thus also in Microsoft 365 or Endpoint Manager. The technology can largely prevent attacks on privileged user accounts. Privileged Identity Management in Azure AD and Microsoft 365 The management of user accounts in Azure AD naturally plays a role above all with …

Privileged Identity Management in Azure AD and Microsoft 365 Read More »

What Is Self-Sovereign Identity (SSI) and Its Use

what is self sovereign identity

Self-Sovereign Identity (SSI) ensures secure and trustworthy digitization. Users can self-sovereign their digital identity and credentials such as ID cards or certificates to applications. The European SSI ecosystem breaks dependencies on monopolists and gives us the freedom to shape the digital future with confidence and speed. What is Self-Sovereign Identity (SSI)? Time, IT security, privacy, …

What Is Self-Sovereign Identity (SSI) and Its Use Read More »

What Is Emergency Management?

What Is Emergency Management?

Emergency management is designed to ensure the continuity of business operations during emergencies. It enables organizations to respond appropriately in the event of disruptions to critical business processes. Components of emergency management are emergency preparedness and emergency response. What is emergency management? Emergency management is part of the IT security strategy and has the task …

What Is Emergency Management? Read More »