Network

Privacy and data protection on the Internet: Eyes on the VPN choices

Virtual Private Networks – VPNs for short – have experienced a boost with the Corona crisis: Ideally, home office employees should have encrypted and secure access to the corporate network. However, this only works if the VPN provider is trustworthy. VPN connections have great advantages: they disguise data traffic on the Internet and protect against …

Privacy and data protection on the Internet: Eyes on the VPN choices Read More »

P2P Improves Vulnerability Management

P2P Improves Vulnerability Management

Security vulnerabilities are one of the most important gateways for cybercriminals, yet companies often take days or weeks to close them. The reason is usually vulnerability management that offers too little automation and takes up too many network resources – especially with remote work, this is a major problem. Solutions with peer-to-peer (P2P) technology provide …

P2P Improves Vulnerability Management Read More »

Hardening Measures for The Active Directory

Hardening Measures for The Active Directory 2

Active Directory protection is an essential factor in network security. If attackers can compromise domain controllers, there is a risk that credentials can be hijacked, putting network services and their data at risk. Hardening measures counteract this. Active Directory is the central point for authenticating users and server services in many networks. Therefore, administrators should …

Hardening Measures for The Active Directory Read More »

How Does the Security Infrastructure of A Smart City Work?

How Does the Security Infrastructure of A Smart City Work

The smart city is a digital image of the city in all its facets and arises from the desire to create added value for residents and visitors through the close-meshed networking of public services and commercial applications. A special feature in the smart city is the public accessibility of IT systems and users since, unlike …

How Does the Security Infrastructure of A Smart City Work? Read More »

Fundamentals of Automated Network Segmentation

Fundamentals of Automated Network Segmentation

Hackers are constantly finding ways to penetrate networks past security solutions in order to extort or cripple companies. Consequently, prevention consists not only of security software, but equally of smart structuring of one’s network to reduce the attack surface. Micro-segmentation and general segmentation of the network means dividing your network into areas where communication takes …

Fundamentals of Automated Network Segmentation Read More »

Device Encryption in Windows 10 and 11: How To Do It with All Editions

Device Encryption in Windows 10 and 11 How To Do It with All Editions

Device encryption in Windows 11 can be used as a replacement for Bitlocker and protect Windows notebooks and PCs from data theft for free but effectively. The article shows how to set up this technology. With device encryption in Windows 10/11, PCs and notebooks on which Windows 10/11 Home is installed can also use data …

Device Encryption in Windows 10 and 11: How To Do It with All Editions Read More »

Challenges of A 20-Year-Old Technology: AD Security Put to The Test

Most organizations today rely on Microsoft Active Directory (AD) to keep their business running. AD is easy to use, has been around for many years and is very reliable. But the service is coming under increasing scrutiny – from a security perspective. Active Directory (AD) performed its service unnoticed for a long time. AD is …

Challenges of A 20-Year-Old Technology: AD Security Put to The Test Read More »

5 Important Aspects of A Successful SIEM Implementation

5 Important Aspects of A Successful SIEM Implementation (1)

Security Information and Event Management (SIEM) provides crucial added value for corporate information security in the detection of IT security incidents. It can significantly shorten the time it takes to identify a threat and thus increase the level of IT security. The prerequisite: the choice and implementation of the solution must be well planned. Cyber …

5 Important Aspects of A Successful SIEM Implementation Read More »

What Is an Overlay Network?

An overlay network is built on top of an existing network and its infrastructure. It interconnects the communication participants and nodes via logical connections. The overlay network provides a logical decoupling from the underlay network and its physical network infrastructure. An overlay network can be used to map virtual network structures and implement missing functionalities …

What Is an Overlay Network? Read More »

Safeguarding the Value Chain: Risk Assessment without It Knowledge.

Safeguarding the Value Chain Risk Assessment without It Knowledge.

With its Lifeblood software, the Füssen-based startup Rimian has set itself the goal of clearly presenting the cyber risks in value creation to the management of companies. The solution provider is now looking for partners. The sheer mass of cyber threats often overwhelms company CEOs. After all, they are rarely so deep into the technical …

Safeguarding the Value Chain: Risk Assessment without It Knowledge. Read More »

PAM alone is not enough!

The need to secure access to organizations’ infrastructures has never been greater. Securing access enables organizations to ensure business continuity, comply with regulatory requirements and, most importantly, make data accessible to all to enable innovation and thus ensure their economic competitiveness. The need for secure access to corporate data has never been greater. With the …

PAM alone is not enough! Read More »

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life

The steep rise in phishing attacks in recent months was reason enough for Sophos to take a closer look at this form of cybercrime. The result: Sophisticated tactics combined with penetrating behavior make up the new quality of phishing emails. Attackers have discovered the benefits of malware-as-a-service (MaaS) – a cousin of ransomware-as-a-service (RaaS), both …

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life Read More »

Implement Zero-Trust and Zero-Knowledge Security

Zero-Trust and Zero-Knowledge Security

Distributed work requires remote monitoring and management of IT infrastructure. So you can protect every user on every device across the enterprise with modern privileged access management. The massive shift to distributed working creates new challenges for IT and DevOps teams, forcing them to monitor and manage infrastructure remotely. IT and DevOps workers need a …

Implement Zero-Trust and Zero-Knowledge Security Read More »

AIOps and Machine Learning: The Secret Recipe for Observability

AIOps and Machine Learning: The Secret Recipe for Observability

Traditional monitoring aggregates and displays data. When problems occur, traditional monitoring generates alerts. And there can be a lot of them. Some alerts are essential, but others just distract from important information. Filtering out these unimportant alerts is therefore essential. Time for Observability! Complex IT infrastructures leverage microservice architectures, and it’s critical that tech professionals …

AIOps and Machine Learning: The Secret Recipe for Observability Read More »