window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Data security

G N T
  • Gemini KI Model

Gemini AI model

2023-12-09T19:11:54+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Gemini is an advanced AI language model developed by Google DeepMind. It serves as the successor to the earlier AI models LaMDA and PaLM 2 and was presented by google in December 2023. Gemini is characterized as an AI model by its multimodality, which means that it can process different types of data, including text, images, audio, video and computer source code. What can the gemini AI do? Gemini will be integrated into Google's search engine, the google advertising products and the Chrome browser. Learn all about google AI now...

  • Ghostbusters Attack - Facebooks Geheimkrieg & Lausch-Attacken

Ghostbusters cyber attack – Facebook’s secret war & eavesdropping attacks

2024-03-28T11:39:04+01:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Snapchat users eavesdropped on by a man-in-the-middle attack by Facebook - Facebook has probably deliberately bypassed Snapchat encryption. As part of a class action lawsuit against Facebook, documents have now been made public that once again provide explosive material in the Facebook scandal surrounding data protection and data sovereignty. Facebook's action against Snapchat was probably more aggressive than ever thought.

  • NIS2: Europas Update zur Cyberabwehr - Was die NIS2-Richtlinie für uns bedeutet

NIS2: Europe’s cyber defense update – What the NIS2 directive means for us

2024-05-08T13:18:51+02:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Who is affected by the NIS regulations? The extended scope of the NIS2 Directive. Enter NIS2: A tightening, an expansion, a necessary evolution. The new NIS2 Directive extends the scope, tightens security and reporting obligations and aims to increase Europe's resilience to cyber attacks. From energy suppliers to digital platforms and public administrations - almost no organization is exempt. The transformation from NIS to NIS2 is therefore not just a change of form, but is intended to be a decisive step in the expansion of our digital fortress.

  • Token zur Authentifizierung - Access Token, Refresh Token und Bearer Token

Token for authentication – Access Token, Refresh Token and Bearer Token

2024-07-20T17:41:14+02:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Are you familiar with the tokens for authentication? You should definitely know the differences between Access Token, Refresh Token and Bearer Token! We explain to you in easy-to-understand terms what is important to protect your data effectively...

Go to Top