Cyber Security
Cyber Threat Notifications_Threat Intelligence

Cyber threats generate hundreds of alerts every day. We show how security teams identify relevant sources, prioritize risks, and act faster.

Read more
Information Security
NIS-2-Betroffenheit von KMU - Studienergebnisse

Many SMEs are affected by NIS-2 without even knowing it. The HvS study highlights key hurdles, practical examples, and pragmatic paths to greater cyber resilience.

Read more
Cyber Security
Man in the middle attacks on ai agents

AI agents may prioritize task completion over security. This article demonstrates how man-in-the-middle attacks can lead to reverse shells, supply chain compromise, and SSH exploitation.

Read more
Cyber Security
npm supply chain attack

Shai-Hulud and npm attacks: what developers need to know about software dependency risks and how to protect themselves.

Read more
Information Security
NIS-2 Umsetzung:  Praxisleitfaden zur rechtssicheren Compliance [inkl. Checkliste]

Practical guide to NIS2 implementation covering scope assessment, maturity levels, ISMS, key requirements and a comprehensive compliance checklist.

Read more
Information Security
NIS-2 directive, overview and requirements

Learn which companies are affected by the NIS-2 Directive, what obligations apply, and how NIS-2 differs from KRITIS, ISO 27001, and TISAX®.

Read more
Cyber Security
INC Ransom Attack: From Initial Access to Full Encryption in 48 Hours

How INC Ransom encrypts systems via the FortiGate vulnerability in just 48 hours – and why timely patching is crucial. Includes background & recommendations.

Read more
Information Security
EASA Part-IS einfach erklärt, was Luftfahrtunternehmen wissen müssen

A straight-forward explanation of EASA Part-IS: What are the regulations and what do they require? Who is affected? Our experts will show you how to get your ISMS & ISMM in shape now.

Read more
Information Security
Bild eines externen informationssicherheitsbeauftragten

Find out why an external ISO is an effective solution for SMEs in particular to ensure information security and compliance - regardless of legal obligations. Benefits, tasks and cooperation options at a glance.

Read more
Cyber Security
Hackers mit einem Tablet in der Hand, photo of a hacker with a tablet in his hands_16_9

Spies dressed up as hackers. In this article, we highlight the APT fallout of vulnerabilities such as ProxyLogon in Exchange (Hafnium), OGNL Injection and log4shell

Read more