The report, “Digital Trust in a Connected World: Navigating the State of IoT Security,” highlights the concerns and challenges facing modern organizations…
Read moreMore and more small and medium-sized companies (SMEs) are increasingly the focus of cyber extortionists. The APT groups Lockbit, BlackCat and Clop (or Cl0p) are particularly active…
Read moreThe latest version of Secret Server from a leading provider of solutions that seamlessly extend Privileged Access Management (PAM) now supports the enforcement of…
Read moreHow cybercriminals abuse QR codes for phishing. The use of technology is constantly evolving to make personal and professional lives more convenient, as...
Read moreWatchGuard is responding to the increasingly clear demand for services to proactively deal with current threat trends with an MDR service that keeps an eye on the threat situation 24/7...
Read moreThe new LANCOM Trusted Access Client enables secure and scalable network access for employees in the office, at home or on the go, thereby protecting...
Read moreAutomated email inbox rules are a useful and familiar feature of most email programs. They help manage inbox and daily…
Read moreThe closer the Cyber Resilience Act (CRA-E) comes into force, the more questions arise for manufacturers and distributors of smart devices. Liable in the future...
Read moreNDR – Network Detection & Response is now considered a security technology in IT security that should not be missing from any company network. But who evaluates…
Read moreThe Network and Information Security Directive 2 (NIS2) will affect thousands of companies within Germany by the end of 2024. In view of increasing cyber threats, the European Commission wants...
Read more