window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Integrity

A D T
  • Apple ID mutiert zum Apple Account

Apple ID mutates into Apple Account – A step with hidden intentions?

2024-03-24T13:31:00+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Apple ID mutates into Apple Account - Apple changes its strategy: Apparently, the US company is about to make a huge move by significantly changing its Apple ID. Not a marketing gag but, as always, a significant strategic move by Apple Starting this fall, Apple plans to convert the Apple ID into the Apple Account. This is definitely not a marketing gimmick. Nor is this a frivolous decision, but rather one that the company has prepared very carefully, as always. Apple stands for innovation and continuous improvement of the user experience. With the planned changeover from the "Apple ID" to the "Apple Account", the company is signaling its continued commitment to user-friendliness and data protection.

  • Digitale Diskretion und das Echo um Taurus im Cyberspace

Digital discretion and the echo around Taurus in cyberspace

2024-03-05T00:18:16+01:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

How the Taurus scandal exposed the weaknesses in our cyber security. Our article not only offers an authentic insight into the events surrounding the Bundeswehr wiretapping incident, but also focuses on a responsible approach. Find out now why robust IT security measures and Auguste Kerckhoff's century-old principles are more relevant than ever in our digital era. We provide valuable insights and solutions to strengthen digital security in an increasingly networked world. Discover with us how transparency, integrity and a progressive error culture pave the way to a safer future.

  • TLS Protocol - The TLS handshake

TLS protocol

2024-12-03T16:45:10+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

What is a TLS protocol? - A TLS protocol ensures secure communication between two hosts on the basis of a transport-protected connection. TLS protocols are part of the transport layer.

  • Zero Trust - Jenseits von VPN: Warum das Virtual Private Network im Schatten von Zero Trust steht

Zero Trust – Beyond VPN: Why the Virtual Private Network is in the Shadow of Zero Trust

2023-12-08T08:57:26+01:00Categories: Cryptography, IT infrastructure, IT Security, Podcast, Software Architecture, Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , |

Zero Trust - Beyond VPN: Why the Virtual Private Network is in the Shadow of Zero Trust - Easy to Understand: A Compact Guide to a Zero Trust Strategy Based on the Zero Trust Framework In this fifth Rock the Prototype Podcast episode, it's all about the revolutionary topic of IT security: zero trust. We wonder why the tried-and-true Virtual Private Network (VPN) is increasingly taking a back seat in the age of Zero Trust. Learn why implementing a Zero Trust approach requires new alternatives and how modern technologies can complement or even replace VPN. Dive into full of insights around IT and innovation.

Go to Top