Cloud Security
Information Security risks are constantly increasing in today’s society. In this setting, SMEs and large enterprises alike are facing a multitude of challenges. The reasons are manyfold; shortage of skilled …
Dec
Information Security risks are constantly increasing in today’s society. In this setting, SMEs and large enterprises alike are facing a multitude of challenges. The reasons are manyfold; shortage of skilled …
Nov
The Internet of Things (IoT) describes a fully connected world with on-demand access to information and systems that process this information. It includes all intelligent, interconnected objects imaginable – billions …
Oct
During the COVID-19 pandemic, a growing dependency on Information Technology became obvious for many organizations, and with it an increase of cyber risks. The exploitation of employees working remotely was …
Sep
Ransomware is one of today’s much discussed types of cyber attack. Several business models around this attack type emerged during the last years. The schema boils down to a threat …
Aug
The theft of credentials is one of today’s risks to Information Security that significantly increased with the rise of Social Engineering. Cyber criminals use credentials to intrude the infrastructure of …
Jul
Losing company assets like laptops, smartphones, or documents, as well as assets getting stolen, are two well known risks to the Information Security of organizations. However, over the last years, …
Jun
A Denial of Service (DoS) attack aims at the availability of a service, website or network. By disrupting or suspending normal data flow, the system is rendered unavailable. Amplifying this …
May
The misuse of ones privileges is an intentional, malicious attack pattern. Most of the data breaches in 2021 in this category were caused by privilege abuse or data mishandling. They …
Apr
Unintentional actions are among the most common patterns in Information Security incidents. Miscellaneous errors of employees can directly compromise assets of an organization and lead to data breaches. According to …
Mar
System Intrusion happens in an early phase of a cyber attack (Figure 1). It usually starts after attackers have collected enough data about the target and assembled tactics for their …