Transformation in die Cloud - welche Cloud darf es sein?

Perspective Security

Results 1 - 9 of 11
Jun 26, 2018 The security hole sits right in front of the computer. In social engineering hackers trick employees to gain access to corporate IT systems Find out more
May 25, 2018 Botnets consist of millions of devices and behave like invincible monsters. Combating them is easier said than done. Remove one and thousands more takes its place. Find out more
Apr 16, 2018 Scientists expect powerful quantum computers to be available in the near future. The downside is that new megacomputers may be able to crack key encryption methods. Find out more
Mar 27, 2018 Higher productivity, higher security risk: how hackers set their sights on connected industrial facilities. Find out more
Nov 17, 2017 A blockchain is a decentralized database which makes sharing information more secure and transparent. Numerous sectors can benefit from this. Find out more
Jan 25, 2017 Security by design significantly reduces the attack surface: security expert Thomas Tschersich explains what companies have to keep in mind. Find out more
Dec 8, 2016 Amazon, Twitter, the German Chancellor's office – DDoS attacks cause systems to collapse more and more frequently by using connected devices in the Internet of Things. Find out more
Nov 18, 2016 To ensure car security, automotive manufacturers need IT security in their cars, mobile communications and back-end systems. Find out more
Oct 25, 2016 What do you do when hackers strike or employees steal important business information? Keep calm and start looking for clues, advises IT forensics expert Volker Wassermann. Find out more