Misconduct, inaccurate policies, and misconfigurations of endpoints are common vulnerabilities. The cyber kill chain usually looks for the weakest link in the chain, which is often people. An analysis of….
Since the beginning of the Corona crisis, companies have had to rethink: employees have been and are being sent to work from home. After almost two years, the home office….
The data center is the heart of a company: This is where applications and information find a – ideally safe – home. Data and applications stored here must not fall….
Vulnerability management helps identify and seal software leaks on endpoints. However, many companies do not use it because they consider the solutions too expensive or simply redundant – after all,….
Schools are closing, cultural and sports events are being canceled, employers are sending employees to the home office. In particular, the latter measure hides an inconspicuous threat that we do….