Transformation in die Cloud - welche Cloud darf es sein?

Perspective Security

Results 1 - 9 of 10
Jun 27, 2018 Botnets consist of millions of devices and behave like invincible monsters. Combating them is easier said than done. Remove one and thousands more takes its place. Find out more
Apr 24, 2018 Scientists expect the first powerful quantum computers to appear in the near future. The drawback is that the new mega computer could crack important encryption methods. Find out more
Apr 10, 2018 Higher productivity, higher security risk. The damage that may be done when hackers target factories and the precautions that can be taken. Find out more
Dec 5, 2017 A blockchain is a decentralized database which makes sharing information more secure and transparent. Numerous sectors can benefit from this technology. Find out more
Feb 14, 2017 Security by design significantly reduces the attack surface: security expert Thomas Tschersich explains what companies have to keep in mind. Find out more
Dec 19, 2016 Amazon, Twitter, the German Chancellor's office – DDoS attacks cause systems to collapse more and more frequently by using connected devices in the Internet of Things. Find out more
Dec 1, 2016 To ensure car security, automotive manufacturers need IT security in their cars, mobile communications and back-end systems. Find out more
Oct 25, 2016 What do you do when hackers strike or employees steal important business information? Keep calm and start looking for clues, advises IT forensics expert Volker Wassermann. Find out more
Aug 18, 2016 Cyber criminals have always targeted mobile devices. How can companies protect themselves? Find out more