Cloud Security

Information Security risks are constantly increasing in today’s society. In this setting, SMEs and large enterprises alike are facing a multitude of challenges. The reasons are manyfold; shortage of skilled …

Internet of Things

Internet of Things

The Internet of Things (IoT) describes a fully connected world with on-demand access to information and systems that process this information. It includes all intelligent, interconnected objects imaginable – billions …

Ransomware

Ransomware

Ransomware is one of today’s much discussed types of cyber attack. Several business models around this attack type emerged during the last years. The schema boils down to a threat …

Lost and Stolen Assets

Lost and Stolen Assets

Losing company assets like laptops, smartphones, or documents, as well as assets getting stolen, are two well known risks to the Information Security of organizations. However, over the last years, …

Denial of Service

A Denial of Service (DoS) attack aims at the availability of a service, website or network. By disrupting or suspending normal data flow, the system is rendered unavailable. Amplifying this …

System Intrusion

System Intrusion happens in an early phase of a cyber attack (Figure 1). It usually starts after attackers have collected enough data about the target and assembled tactics for their …

Social Engineering

Social Engineering

In social engineering, an attacker exploits the “human factor” as the supposed weakest link in the information security chain in order to accomplish his criminal intent. SECURNITE explains what Social Engineering is.