window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Security

A F G I O R S
  • Apple ID mutiert zum Apple Account

Apple ID mutates into Apple Account – A step with hidden intentions?

2024-03-24T13:31:00+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Apple ID mutates into Apple Account - Apple changes its strategy: Apparently, the US company is about to make a huge move by significantly changing its Apple ID. Not a marketing gag but, as always, a significant strategic move by Apple Starting this fall, Apple plans to convert the Apple ID into the Apple Account. This is definitely not a marketing gimmick. Nor is this a frivolous decision, but rather one that the company has prepared very carefully, as always. Apple stands for innovation and continuous improvement of the user experience. With the planned changeover from the "Apple ID" to the "Apple Account", the company is signaling its continued commitment to user-friendliness and data protection.

  • Architecture Trade-off Analysis Method (ATAM) - Software Architektur Reviews - Qualitätsszenarien für Softwarearchitektur

Architecture Trade-off Analysis Method (ATAM) – Software Architecture Reviews

2024-09-17T17:46:45+02:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

What is the Architecture Trade-off Analysis Method (ATAM)? If you have ever worked with complex systems as a software architect, you know how crucial these trade-offs are for the long-term success of a project. ATAM helps you to better understand these trade-offs and identify potential risks early on before they have a negative impact in later development phases.

Authentication

2024-11-22T08:27:45+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

Authentication is a multi-step process in identity management. Authentication in an IT system implements IT security functions that are realized by various security services and components.

  • From Stargate to Europe: Why innovation has no future without values

From Stargate to Europe: Why innovation has no future without values

2025-01-27T19:52:05+01:00Categories: Artificial intelligence (AI)|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

From STARGATE to us in Europe: Why innovation has no future without values - What connects Trump's "Stargate" promise, Europe's invisibility in Davos and Elon Musk's statements at an AfD event? A common theme: responsibility

  • Ghostbusters Attack - Facebooks Geheimkrieg & Lausch-Attacken

Ghostbusters cyber attack – Facebook’s secret war & eavesdropping attacks

2024-03-28T11:39:04+01:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Snapchat users eavesdropped on by a man-in-the-middle attack by Facebook - Facebook has probably deliberately bypassed Snapchat encryption. As part of a class action lawsuit against Facebook, documents have now been made public that once again provide explosive material in the Facebook scandal surrounding data protection and data sovereignty. Facebook's action against Snapchat was probably more aggressive than ever thought.

  • Identitätsmanagement und Vertrauensmodelle in digitalen Infrastrukturen

Identity management and trust models in digital infrastructures

2024-02-01T09:43:03+01:00Categories: IT infrastructure, IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Identity and access management and trust models in digital infrastructures are the invisible architectures that hold our digitally networked world together. In an era in which our lives increasingly take place online, complex networks interacting with digital identities, protocols and standards form the basic technical infrastructures that we use every day. And in the middle of it all: trust-based identities.

  • IT Standards - Warum Interoperabilität und Sicherheit unverzichtbar sind

IT standards – Why interoperability and security are essential

2024-02-24T18:19:09+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

IT standards are the invisible network that ensures security, enables interoperability and holds our digital landscape together. Without IT standards, we would fall back into an era of digital turbulence in which nothing communicates with each other, security gaps are omnipresent and no progress is possible. Today we dive into the world of IT standards - we explore why they are essential, what makes a good standard and how they shape our digital future.

  • OpenID - OpenID Foundation - Standards für digitale Identitäten

OpenID

2023-12-13T08:37:57+01:00Tags: , , , , , , , , , , , , , , , , , , , , , |

All about OpenID - Discover everything you need to know about OpenID: from secure authentication and identity federation to the latest developments like OpenID Connect and the OpenID Foundation. Here you will find a comprehensive overview of digital identity.

  • Refresh Token

Refresh Token

2024-07-11T15:51:41+02:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

What is a refresh token? Refresh tokens are essential components of modern authentication systems and an indispensable element in protocols such as OAuth 2.0 to enable the secure management of access rights to web resources. Find out more about how Refresh Token works and its life cycle...

Go to Top