CYBER SECURITY

What’s In The Antivirus Solution Defender For Endpoints?

Since we dealt with Microsoft Defender as virus protection for private individuals in the first article, the second part will…

2 years ago

Security Gaps Caused By Smart Household Appliances

  In order to protect company computers in the home office, new measures must be taken to counter the danger…

2 years ago

Secure Remote Work – This Is How IT Managers Secure The Hybrid Working World

Since the lockdown, remote work and home office have become an integral part of our everyday lives - we now…

2 years ago

Identity Theft On The Internet: Protecting Your Digital Identity

People today have not only an analog, but also a digital identity: You meet up with friends in social networks,…

2 years ago

Password And Security: How Is Access Secured?

In today's blog post, we are once again focusing on the topic of passwords and security: After all, password-based login…

2 years ago

Supply Chain Security: IT Security For The Supply Chain

Supply chain attacks, i.e. attacks on the supply chain, are a trend that has been going on for several years…

2 years ago

Detect Attackers As They Enter The Network From The Cloud

The numerous successful cyber attacks in recent months make it abundantly clear: IT security teams need insight into how users…

2 years ago

Smishing: Cell Phones Targeted By Cybercriminals

Internet Shopping Is Becoming More And More Popular At the same time, the thriving online trade and parcel boom is…

3 years ago

Cybersecurity Frameworks In The Security Operations Center (SOC)

The centralized department responsible for securing valuable company data and digital infrastructure within any organization is known as a Security…

3 years ago

5 Tips For Data Security With Augmented Reality Solutions

The advantages of using augmented reality solutions are obvious. With the help of wearables, employees can carry out their work…

3 years ago