If you think technology can solve your security problems, then you don’t understand the problems, and you don’t understand the technology. This saying has been the mantra of the InfoSec community for decades, and as risk management, governance and compliance become...
It took us a while to experience the spring awakening not only in the calendar but also in nature. All the more reason for us to be happy about the “more lightness” that is also making its way into everyday life. Analogous to the melting of the snow, which...
“The internet has educated its users: Today, you no longer just want to know that something is happening, you want to know why and how it is happening. Secrets are only allowed in exceptions, transparency is the rule – and has long been demanded.”...
The dramatic increase in cyber attacks last year puts the unpopular topic of “security” in the immediate focus. The identified attack surfaces are multi-layered and show: Hackers find every loophole and combine technology and social engineering in equal...
In the meantime, they fill not only books, but libraries: the number of cyber attacks that cause great economic damage around the globe. Yet hacker attacks do not happen purely by chance or out of arbitrariness. Hacker organisations work highly professionally and are...
Data is the gold of digitalisation and thus represents the most valuable asset in companies and organisations. We can use the metaphor of liquid gold for this. It is produced at a starting point and then flows through the company along the value chain, driven by the...