Business

What is Operational Technology (OT)?

What is Operational Technology (OT)?

Operational technology includes software and hardware for monitoring and controlling industrial plants or physical machines and their processes. In the past, these were often proprietary solutions operated in isolated environments. Digitization and the Internet of Things are merging traditional IT with operational technology. This fusion is referred to as IT/OT convergence. What is Operational Technology …

What is Operational Technology (OT)? Read More »

What is MIM?

What is MIM Mobile Information Management

Mobile Information Management (MIM) ensures the secure provision of corporate data on mobile devices. Along with Mobile Device Management (MDM) and Mobile Application Management (MAM), it is another important component of Enterprise Mobility Management. MIM leverages technologies and practices such as encryption, cloud services, sandboxing, containers and others. What is MIM (Mobile Information Management)? The …

What is MIM? Read More »

What is a Bot?

What is a Bot

A bot is a computer program that independently performs tasks in an automated manner without the involvement of a user. There are different types of bots that perform different tasks. They range from social bots to chatbots to search engine bots. Bots can be useful or malicious. When bots communicate over a network, it is …

What is a Bot? Read More »

Cyber Kill Chain – Basics, Application and Development!

Cyber Kill Chain - Basics Application and Development

To detect and defend against cyberattacks earlier, you need to understand the attackers’ objectives and approach and build defenses accordingly. The Lockheed Martin Cyber Kill Chain is a multi-step model for analyzing attacks and building defenses along with the attack steps. Cyber Kill Chain – Basics, Application, and Development Detecting and disabling attackers is not …

Cyber Kill Chain – Basics, Application and Development! Read More »

What is CEO Fraud?

What is CEO Fraud

CEO Fraud is a fraud method in which the attacker pretends to be a CEO, manager, or boss and asks employees to transfer money to a specific account, for example. If the attacker uses email as a means of communication, CEO Fraud is a form of Business Email Compromise (BEC). However, other attack vectors are …

What is CEO Fraud? Read More »

What is A Sandbox?

What is a sandbox

A sandbox is an isolated area, sealed off from the system environment, in which software can be executed in a protected manner. Sandboxes can be used, for example, to test software or to protect the underlying system from changes. What is a sandbox? A sandbox is an isolated area in which software can be executed …

What is A Sandbox? Read More »

What is Meltdown?

What is Meltdown

Meltdown is a security vulnerability published in 2018 together with Spectre. It is due to a vulnerability in the hardware architecture of processors and allows unauthorized reading of the memory contents of third-party processes. Processors from various manufacturers such as x86 processors from Intel are affected. Software patches to fix the problem cause performance degradation. …

What is Meltdown? Read More »

What is a DDoS attack?

What is a DDoS attack

A DDoS attack attempts to cause the unavailability of Internet service through a deliberately induced overload. Usually, botnets consisting of a multitude of individual systems are used for the attack. The target of the attack can be servers or other network components. What is a DDoS attack (Distributed Denial of Service (DDoS)? The acronym DDoS …

What is a DDoS attack? Read More »

What is Air Gap?

What is Air Gap security

Air Gap is a security concept that meets the highest security requirements. It describes the complete physical and logical isolation of computers from each other and from networks. Information exchange between systems is possible, for example, via transportable storage media. Methods such as side-channel attacks exist to overcome an air gap. What is Air Gap? …

What is Air Gap? Read More »

What is Patch Management?

What is Patch Management

Patch management is nowadays an integral part of system management. It deals with the procurement, testing, and installation of required updates for applications, drivers, and operating systems of computers. What is Patch Management? The literal translation of the English term “to patch” is “to mend”. Transferred to the world of programming, patch refers to software …

What is Patch Management? Read More »

What is Phishing?

What is phishing

Phishing describes the attempt to steal identities and passwords via the Internet by sending fake e-mails or text messages. Internet users are lured by cybercriminals to fake websites of banks, online stores, or other online services by means of deceptively real fake e-mails in order to get hold of their user IDs and passwords. The …

What is Phishing? Read More »

What is Cyber Resilience?

What is Cyber Resilience?

Cyber Resilience is a holistic strategy to strengthen the resilience of an organization’s IT against cyber attacks. Among other things, cyber resilience includes the concepts of cyber security and business continuity management. It is designed to prevent attacks on IT and ensure secure continued operations and rapid resumption of operations. What is Cyber Resilience? Cyber …

What is Cyber Resilience? Read More »

What is Data Protection?

What is data protection

Data protection, i.e. the protection of personal data, secures the fundamental right of individuals to informational self-determination. This gives people the freedom to determine how their data is handled. Personal rights and privacy are to be preserved. What is data protection? Data protection does not protect the data itself, but rather the freedom of people …

What is Data Protection? Read More »

What is a Network Domain?

What is a Network Domain

A network domain is an administratively delimited network area that can be used to logically map the organizational structures of a company. Security policies, user rights, and user roles are managed centrally via a domain controller. A user logs on to a domain via the domain controller. Domains have unique names and are structured hierarchically. …

What is a Network Domain? Read More »

What is DevSecOps?

What is DevSecOps?

DevSecOps extends the DevOps concept to include aspects of software security. The artificial word is made up of the individual terms development, security, and operations. It is a holistic approach that takes security into account in all phases of the software lifecycle and integrates it into the processes. What is DevSecOps? DevSecOps is a made-up …

What is DevSecOps? Read More »

What is Business Continuity?

what is business continuity

Business continuity describes measures and processes that are intended to maintain IT operations under crisis situations or ensure trouble-free start-up after a failure. Business continuity is intended to minimize risks and damages for companies and organizations. What is Business Continuity? Business continuity includes strategies, plans, measures, and processes to minimize damage caused by the interruption …

What is Business Continuity? Read More »