Encryption

Sustainable Learning with Gamification and Storytelling

Sustainable Learning with Gamification and Storytelling -

Today, it takes more than just protective technologies to fend off cyberattacks. Attentive employees can prevent attempted attacks via phishing or social engineering at an early stage by adopting the right behavior. Security awareness training can improve awareness of cyber risks among the workforce. Modern training courses rely on gamification and storytelling. Can you still …

Sustainable Learning with Gamification and Storytelling Read More »

Cyber Threats to Midsize Businesses on The Rise

small business cyber threats

The coronavirus has triggered a “digital pandemic.” Medium-sized businesses, in particular, have become a greater focus for cybercriminals because security measures in many places are inadequate. To protect data, companies cannot rely on pre-pandemic protocols, policies, and infrastructures and must implement appropriate identity and access management solutions. Cyberattacks incur high costs that can bankrupt small …

Cyber Threats to Midsize Businesses on The Rise Read More »

The Color of Security: Working Safely with Last Pass

How to combine the new IT security requirements of companies with a good user experience for employees – safe and relaxed working is the goal. With cybercrime threats still growing steadily, the question of how to make enterprise collaboration not only more secure, but also more relaxed, arises more than ever. This applies to employees …

The Color of Security: Working Safely with Last Pass Read More »

GDPR Right to Information: The Right to Information Under the GDPR Knows Limits

gdpr right to information -

The right of access allows individuals to know how and why their personal data is being processed, according to the European Data Protection Board (EDSA). But the right of access is also abused or misused. Companies should therefore also be aware of the limits of the right to information, as demonstrated by recent rulings. “The …

GDPR Right to Information: The Right to Information Under the GDPR Knows Limits Read More »

Attention, Cost Trap: Security Vulnerabilities in APIs

api security vulnerabilities -

Costs due to insecure APIs have increased sharply. That’s according to a study published by Imperva. This looked at 117,000 cybersecurity incidents and estimates that API vulnerabilities cause $41 billion to $75 billion in losses per year. An API is an invisible ribbon that allows applications to share data to improve end-user experiences and outcomes. …

Attention, Cost Trap: Security Vulnerabilities in APIs Read More »

Metaverse and Its Security – What’s Changing Now

The metaverse is a concept that has been gaining momentum for several years, catapulting into the mainstream after Mark Zuckerberg’s rebranding of Facebook’s parent organization, Meta. The growing acceptance and interest of big tech suggest that a move toward the metaverse is arguably imminent as well as theoretically simple, but that’s not necessarily the case …

Metaverse and Its Security – What’s Changing Now Read More »

How Network Security Works for KRITIS Companies

How Network Security Works for KRITIS Companies

As operators of critical infrastructures (CRITIS), energy companies must meet high security requirements, as cyber-attacks and associated outages or disruptions can be of extraordinary consequence. However, network security in particular is increasingly challenging in the sector. Access controls and network performance, for example, must be adapted to an increasingly distributed workforce and thus increased the …

How Network Security Works for KRITIS Companies Read More »

Unmistakable Clues to An APT Attack

Unmistakable Clues to An APT Attack-

APT hackers avoid verifiable events, error messages, or service interruptions and target data theft or system monitoring over an extended period of time. After that, they usually disappear again unnoticed. Is it possible to detect something that should remain silent and unnoticed? APT hackers and malware are more widespread and sophisticated than ever. For some …

Unmistakable Clues to An APT Attack Read More »

Privacy and data protection on the Internet: Eyes on the VPN choices

Virtual Private Networks – VPNs for short – have experienced a boost with the Corona crisis: Ideally, home office employees should have encrypted and secure access to the corporate network. However, this only works if the VPN provider is trustworthy. VPN connections have great advantages: they disguise data traffic on the Internet and protect against …

Privacy and data protection on the Internet: Eyes on the VPN choices Read More »

P2P Improves Vulnerability Management

P2P Improves Vulnerability Management

Security vulnerabilities are one of the most important gateways for cybercriminals, yet companies often take days or weeks to close them. The reason is usually vulnerability management that offers too little automation and takes up too many network resources – especially with remote work, this is a major problem. Solutions with peer-to-peer (P2P) technology provide …

P2P Improves Vulnerability Management Read More »

Identity and Access Functions Combined: Microsoft Introduces Entra Product Family

Identity and Access Functions Combined Microsoft Introduces Entra Product Family-

In its new Entra product family, Microsoft is focusing on secure access to networked worlds. To this end, Entra includes identity and access management, cloud infrastructure entitlement management, and identity verification. According to a blog post by Joy Chik, corporate vice president of identity at Microsoft, Entra is intended to pursue a new, comprehensive understanding …

Identity and Access Functions Combined: Microsoft Introduces Entra Product Family Read More »

Database Security: Costs, Benefits and Risks of Database Backups

In the modern workplace, data is the lifeblood for businesses and protecting it is correspondingly important. And database backups are one of the common methods database administrators (DBAs) use to ensure the continued availability of data: This involves copying data and schemas from a database and storing them in another location from which they can …

Database Security: Costs, Benefits and Risks of Database Backups Read More »

NRW Data Protection Report: Rebuke for Security Authorities

In her annual report, the new chief data protection officer of the state of North Rhine-Westphalia (NRW) takes on the police and public prosecutors, criticizing data protection breaches. In her new annual report, NRW data protection commissioner Bettina Gayk criticizes police and public prosecutors. For example, in its investigations into suspected right-wing extremist networks within …

NRW Data Protection Report: Rebuke for Security Authorities Read More »