English
Deutsch
Menu
English
Deutsch
Secure IT for Business
Home
Threats
Security Awareness
Security Management
Basic protection
Content Pool
About
Menu
Home
Threats
Security Awareness
Security Management
Basic protection
Content Pool
About
Content-Pool
Downloads
Automation for the Security Operations Center with SIEM, SOAR, and XDR
Cutting response times, minimizing the risk of damage: How innovative technologies cooperate in the automated defense against cyberattacks.
zum Download
How to find the right Managed Security Service Provider (MSSP)
Support in decision-making: The challenges CIOs face when choosing and contracting a managed security service provider.
zum Download
Cybersecurity: Human vulnerability. How HR and IT managers can eliminate it
Cyber threats are a corporate risk – creating sustainable security awareness through training and education.
zum Download
Cyber insurance: How to design and find the right model
Criteria for determining and selecting the most suitable cyber insurance. Steps and stages for achieving the cyber insurance goal.
zum Download
Paranoia Meets Realism: How Much Cybersecurity Do We Really Need?
Cost-benefit analysis of cybersecurity investments: Why processes, training and awareness-raising play an important role alongside technology.
zum Download
How KRITIS operators implement IT security in a compliant manner
Protecting critical infrastructures (KRITIS) in turbulent cybercrime times: the impact of new laws like IT-SiG 2.0, NIS 2 & CRA.
zum Download
Using Artificial Intelligence to Improve Cybersecurity and Defend Against AI-Based Attacks
How AI is being used for IT security, but also for cyberattacks – and how you can best protect yourself against AI-based attacks.
zum Download
How to effectively protect operating environments from cyber attacks
The consequences of under-protecting operational technology (OT) systems and how to achieve seamless OT cyber security.
zum Download
Supply chain attacks: How they work and how to protect yourself
What you need to know about cyberattacks on supply chains, how you can best defend yourself and lessons you can learn from practical use cases.
zum Download
The limitations of MFA and the opportunities of passwordless authentication
How to successfully integrate a passwordless authentication system into your company's zero-trust-based IT security architecture.
zum Download
Zero Trust as a bulwark against cybercrime – a new interpretation of security
Zero Trust Concept as Response to Cyber Threats: Characteristics, Advantages, Disadvantages. Increased Security in the Hybrid Cloud and Hybrid Work Era.
zum Download
Registration-free content
How to Improve IT Security with Application Whitelisting
Application whitelisting can significantly increase security and reduce the risk of malware, but there are a few things to keep in mind.
mehr erfahren
Which ransomware trends represent the greatest threat?
As-a-service malware and ransomware: ever lower barriers to entry for cyber attackers. Open home office and cloud flanks.
mehr erfahren
Cloud Security: How to Improve the Security of your Cloud Resources
High transparency, multi-factor authentication, access rights management, endpoint protection: key criteria for cloud security.
mehr erfahren
Why companies need a well thought-out IT disaster recovery plan
IT Disaster Recovery Plan for Businesses: Content, Objectives, Challenges, Approach and Benefits. Deployment scenarios and emergency plan checklist.
mehr erfahren
How to increase SIEM’s power against cyberattacks with additional tools
SIEM in the Fight Against Cybercrime: How SOAR, XDR, and Managed Services Optimize the Impact of Security Information & Event Management (SIEM)
mehr erfahren
How Smart & Connected Security Strategies Protect Against Ransomware
Intelligent Integrated Cybersecurity Systems & Strategies - Increasingly sophisticated attacks require a well-thought-out and synchronized defense.
mehr erfahren
What companies can do to improve password security
Strong Passwords - Myths, Facts, Optimizations, Protections. Alternative: How to log in without a password.
mehr erfahren
How to recognize and successfully avoid phishing traps
Phishing, spear phishing & co: the variants, the most reliable warning signals, the most important lines of defense and defensive measures.
mehr erfahren
How to secure your multi-cloud systems with unified backups
Unified backups: Central component for ensuring business continuity. Ideal for use in distributed infrastructures.
mehr erfahren
When working from home becomes a security risk for the company
Home office leaks as a new security risk for companies. How cyber attackers exploit the video sessions of remote workers.
mehr erfahren
Switch The Language
Deutsch
English