window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Network Security

C I N
  • Cyberangriff auf Microsoft

Cyberattack on Microsoft – Fact-based analysis of the attack vectors

2024-01-22T19:50:34+01:00Categories: IT infrastructure, IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cyberattack on Microsoft - Fact-based analysis of the attack vectors. The most recent example of a sophisticated cyberattack is the cyberattack on Microsoft. This new IT hack on widely used standard software proves how vulnerable even leading technology companies with advanced security systems can be. Cyberattacks such as the one on Microsoft infrastructures are exemplary and must be regarded as a generally valid call for proactive protection in favor of robust cybersecurity architectures due to the widespread use of software solutions.

  • IT Security - Bridging the gap between Software development and IT Security Teams - Rock the prototype

IT Security: Bridging the Gap Between Software Development and IT-Security Teams

2023-09-07T14:01:59+02:00Categories: Cryptography, IT infrastructure, IT Security, Podcast, Software Architecture, Software development|Tags: , , , , , , , , , , , , , , , |

Unlock the Secrets to IT-Security and fortified Software: Discover why IT Security isn't just an add-on but a fundamental pillar in software development. From expert insights to actionable steps, our comprehensive guide reveals how to seamlessly integrate security measures for more robust applications. Don't let your software be the weakest link - read on to fortify your code and your business!

  • IT Standards - Warum Interoperabilität und Sicherheit unverzichtbar sind

IT standards – Why interoperability and security are essential

2024-02-24T18:19:09+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

IT standards are the invisible network that ensures security, enables interoperability and holds our digital landscape together. Without IT standards, we would fall back into an era of digital turbulence in which nothing communicates with each other, security gaps are omnipresent and no progress is possible. Today we dive into the world of IT standards - we explore why they are essential, what makes a good standard and how they shape our digital future.

  • NIS2: Europas Update zur Cyberabwehr - Was die NIS2-Richtlinie für uns bedeutet

NIS2: Europe’s cyber defense update – What the NIS2 directive means for us

2024-05-08T13:18:51+02:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Who is affected by the NIS regulations? The extended scope of the NIS2 Directive. Enter NIS2: A tightening, an expansion, a necessary evolution. The new NIS2 Directive extends the scope, tightens security and reporting obligations and aims to increase Europe's resilience to cyber attacks. From energy suppliers to digital platforms and public administrations - almost no organization is exempt. The transformation from NIS to NIS2 is therefore not just a change of form, but is intended to be a decisive step in the expansion of our digital fortress.

  • Zero Trust - Jenseits von VPN: Warum das Virtual Private Network im Schatten von Zero Trust steht

Zero Trust – Beyond VPN: Why the Virtual Private Network is in the Shadow of Zero Trust

2023-12-08T08:57:26+01:00Categories: Cryptography, IT infrastructure, IT Security, Podcast, Software Architecture, Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , |

Zero Trust - Beyond VPN: Why the Virtual Private Network is in the Shadow of Zero Trust - Easy to Understand: A Compact Guide to a Zero Trust Strategy Based on the Zero Trust Framework In this fifth Rock the Prototype Podcast episode, it's all about the revolutionary topic of IT security: zero trust. We wonder why the tried-and-true Virtual Private Network (VPN) is increasingly taking a back seat in the age of Zero Trust. Learn why implementing a Zero Trust approach requires new alternatives and how modern technologies can complement or even replace VPN. Dive into full of insights around IT and innovation.

Go to Top