Serverless Security – New Challenges In Securing Applications

The digital transformation brings innovations – sometimes that more and more applications are operated in the cloud. Of course, this has advantages: the maintenance effort, for example, is significantly reduced, which means that costs can also be reduced. But it is also essential to deal with IT security – and we will do that for […]

IT Refurbishing – Used Is Not Always Used!

It is almost impossible to carry out modern business processes without using new information and communication devices. However, the trend towards more devices and a shorter useful life hurts the environment. With this in mind, more and more sustainability-oriented companies are opting for “IT refurbishing” and “refurbished IT”. In the following sections, you can read […]

What’s the Difference Between a Security Operations Center and SIEM?

A security operations center is an essential part of any safely operated network. Many different things are going on inside busy security operations centers. For example, the SOC engineers have significant functions across all the centers, regardless of size. Continual Monitoring, Analysis, and Response Practices Engineers monitor network threats 24 hours a day, seven days […]

These Are The Cybercriminals’ Psychological Tricks

How do hackers get someone else’s access data and passwords? You ask for it. Flattery, dangerous curiosity or misunderstood willingness to help, especially in the run-up to Christmas, can be the door opener. HP names the six most common psychological tricks used by cybercriminals. Social engineering attacks – the art of getting someone to do […]

Logical Computer Security – Basic Principles And Fundamental Policies

Information in its broadest meaning is today one of the essential elements for the development and growth of any organization’s business. The current social and commercial interconnection makes information security an essential element, as information is increasingly exposed to a growing number and variety of threats and vulnerabilities. Consequently, adequate and effective protection is needed. […]

Back To Top