Transformation in die Cloud - welche Cloud darf es sein?

Perspective Security

Results 1 - 9 of 12
Nov 14, 2018 When it can be explained how machines learn, transparency factors into the decisions made by artificial intelligence. Find out more
Jun 27, 2018 Botnets consist of millions of devices and behave like invincible monsters. Combating them is easier said than done. Remove one and thousands more takes its place. Find out more
Jun 26, 2018 The security hole sits right in front of the computer. In social engineering hackers trick employees to gain access to corporate IT systems Find out more
Apr 24, 2018 Scientists expect the first powerful quantum computers to appear in the near future. The drawback is that the new mega computer could crack important encryption methods. Find out more
Apr 10, 2018 Higher productivity, higher security risk. The damage that may be done when hackers target factories and the precautions that can be taken. Find out more
Dec 5, 2017 A blockchain is a decentralized database which makes sharing information more secure and transparent. Numerous sectors can benefit from this technology. Find out more
Feb 14, 2017 Security by design significantly reduces the attack surface: security expert Thomas Tschersich explains what companies have to keep in mind. Find out more
Dec 19, 2016 Amazon, Twitter, the German Chancellor's office – DDoS attacks cause systems to collapse more and more frequently by using connected devices in the Internet of Things. Find out more
Dec 1, 2016 To ensure car security, automotive manufacturers need IT security in their cars, mobile communications and back-end systems. Find out more