window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Compliance

A G I N R S
  • Artificial Intelligence Act - AI Act der EU

Artificial Intelligence Act – All the facts about the EU’s AI Act

2025-01-11T10:02:52+01:00Tags: , , , , , , , , , , , , , , , , , , , , |

What is the EU's Artificial Intelligence Act - AI Act for short? The Artificial Intelligence Act (AI Act) is the world's first binding law regulating artificial intelligence (AI). The AI Act was adopted by the European Commission on March 13, 2024, after being introduced as a legislative proposal in April 2021. The AI Act is thus part of a broader European Union (EU) AI strategy that aims to harness the potential of AI while minimizing risks, maximizing opportunities, combating discrimination and ensuring transparency in the use of AI technologies.

  • GitOps - Effiziente Infrastrukturverwaltung mit Git und Kubernetes

GitOps – Efficient infrastructure management with Git & Kubernetes

2024-06-06T16:38:03+02:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

What is GitOps? Which 4 basic GitOps principles you should definitely know... Overview and relevance of Git-based workflows in modern software development. Now understand the basics of GitOps and master the core components of GitOps.

  • Identitätsmanagement und Vertrauensmodelle in digitalen Infrastrukturen

Identity management and trust models in digital infrastructures

2024-02-01T09:43:03+01:00Categories: IT infrastructure, IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Identity and access management and trust models in digital infrastructures are the invisible architectures that hold our digitally networked world together. In an era in which our lives increasingly take place online, complex networks interacting with digital identities, protocols and standards form the basic technical infrastructures that we use every day. And in the middle of it all: trust-based identities.

  • IT Standards - Warum Interoperabilität und Sicherheit unverzichtbar sind

IT standards – Why interoperability and security are essential

2024-02-24T18:19:09+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

IT standards are the invisible network that ensures security, enables interoperability and holds our digital landscape together. Without IT standards, we would fall back into an era of digital turbulence in which nothing communicates with each other, security gaps are omnipresent and no progress is possible. Today we dive into the world of IT standards - we explore why they are essential, what makes a good standard and how they shape our digital future.

  • NIS2: Europas Update zur Cyberabwehr - Was die NIS2-Richtlinie für uns bedeutet

NIS2: Europe’s cyber defense update – What the NIS2 directive means for us

2024-05-08T13:18:51+02:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Who is affected by the NIS regulations? The extended scope of the NIS2 Directive. Enter NIS2: A tightening, an expansion, a necessary evolution. The new NIS2 Directive extends the scope, tightens security and reporting obligations and aims to increase Europe's resilience to cyber attacks. From energy suppliers to digital platforms and public administrations - almost no organization is exempt. The transformation from NIS to NIS2 is therefore not just a change of form, but is intended to be a decisive step in the expansion of our digital fortress.

  • Refresh Token

Refresh Token

2024-07-11T15:51:41+02:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

What is a refresh token? Refresh tokens are essential components of modern authentication systems and an indispensable element in protocols such as OAuth 2.0 to enable the secure management of access rights to web resources. Find out more about how Refresh Token works and its life cycle...

  • v.l.n.r.: Christiane Fritsch, Luise Kranich, Thomas Lohninger, Uwe Kraus, Anja Lehmann, Peter Parycek, Brian Behlendorf, Torsten Loddersteddt, Ulrich Weinberg, Ariane Jäger - copyright Felix Adler

SPRIND prototyping competition for digital wallets

2024-05-30T18:29:28+02:00Categories: Prototyping|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

In the first nomination round of the prototyping competition in SPRIND's EUDI Wallet Prototypes innovation competition, 6 teams were nominated. A remarkable milestone for digital identities and an efficient approach to developing digital technologies. This competition clearly differs from traditional public tenders due to its prototypical approach and emphasizes the importance of agile and user-centric software applications.

Go to Top