Cloud Security
Information Security risks are constantly increasing in today’s society. In this setting, SMEs and large enterprises alike are facing a multitude of challenges. The reasons are manyfold; shortage of skilled …
Dec
Information Security risks are constantly increasing in today’s society. In this setting, SMEs and large enterprises alike are facing a multitude of challenges. The reasons are manyfold; shortage of skilled …
Nov
The Internet of Things (IoT) describes a fully connected world with on-demand access to information and systems that process this information. It includes all intelligent, interconnected objects imaginable – billions …
Oct
During the COVID-19 pandemic, a growing dependency on Information Technology became obvious for many organizations, and with it an increase of cyber risks. The exploitation of employees working remotely was …
Sep
Ransomware is one of today’s much discussed types of cyber attack. Several business models around this attack type emerged during the last years. The schema boils down to a threat …
Jul
Losing company assets like laptops, smartphones, or documents, as well as assets getting stolen, are two well known risks to the Information Security of organizations. However, over the last years, …
Jun
A Denial of Service (DoS) attack aims at the availability of a service, website or network. By disrupting or suspending normal data flow, the system is rendered unavailable. Amplifying this …
Mar
System Intrusion happens in an early phase of a cyber attack (Figure 1). It usually starts after attackers have collected enough data about the target and assembled tactics for their …
Feb
Web applications are often compromised by basic attacks that require only a small number of steps or additional actions after the initial compromise. The attackers are rather focused, for example, …
Jan
In social engineering, an attacker exploits the “human factor” as the supposed weakest link in the information security chain in order to accomplish his criminal intent. SECURNITE explains what Social Engineering is.
Oct
Participate in our webinar at 21.10.2020 10:00 AM MESZ: REGISTER FREE OF CHARGE! Does your organisation require a security audit due to industry regulations or because potential investors or other …