Goes faster than you think
With modern IT security technologies, companies can quickly implement Zero Trust solutions. Three examples show how they enable their employees to safely access cloud applications and company-owned applications from anywhere and surf the web without risk.
What to do if data has been published on the dark web?
Sensitive personal or company data is increasingly ending up in the dark corners of the internet, where it can be exploited by hackers. Dark Web Monitoring offers IT managers an early warning system for data leaks and helps them to detect data breaches in good time and take countermeasures.
Ad
Study
Fortinet has published its 2024 Global Cybersecurity Skills Gap Report published. The report highlights the ongoing challenges of the global cybersecurity skills shortage.
Ad
NIS2 as a real opportunity
Nobody likes to follow instructions – even if they are common sense – as long as there is no obligation to do so.
NIS2 and Co.
Companies are currently facing a wave of new regulations in the area of IT security. These developments are a reaction to the increasing threats posed by cyber attacks and the growing importance of securing networks and infrastructures.
Ad
Responsibility shifted
After Microsoft initially refrained from publicly commenting on the global IT security debacle on July 19, 2024, the Wall Street Journal published an accusation against the European Commission just a few days later: it was not CrowdStrike, but the EU itself that was primarily responsible for the world’s largest
Defined cybersecurity measures
The new version of the EU NIS Directive not only increases the minimum requirements for cyber security, it also affects significantly more companies than before. What measures should companies take now?
Ad

Events

Veranstaltungen

21.05.2025
 - 23.05.2025
Berlin

Most read articles.

Ad
Ad
Ad
Ad