Zero-day exploit
What is a Zero-day exploit?
  • Security

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

What is a Zero-day exploit?
Wipe hard drive
How to wipe a hard drive (HDD or SSD) securely
  • Security

Even formatting a hard drive under Windows or Mac does not completely wipe all data. Although wiping it is not impossible, it requires additional tools to be able to wipe a Mac hard drive or Windows hard drive with the utmost thoroughness. These can be used to safely wipe and overwrite data on both an HDD and an SSD. You can find out how this works here.

How to wipe a hard drive (HDD or SSD) securely
What is spoofing?
What is spoofing?
  • Security

Spoofing attacks encompass a wide range of potential attack scenarios. Besides conventional approaches like IP spoofing and DNS spoofing, they also include particularly dangerous phishing attacks. Read this article to find out how spoofing attacks work and what measures you can take to protect yourself effectively.

What is spoofing?
What is SIEM?
What is SIEM (Security Information and Event Management)?
  • Security

Security gaps in IT infrastructure can risk a company’s reputation or even threaten its survival. Where criminals manage to shut down company networks or gain access to sensitive data, financial and image-related damage becomes a certainty. SIEM (Security Information and Event Management) allows businesses to detect danger in real-time, allowing for appropriate and timely reactions.

What is SIEM (Security Information and Event Management)?
What is role-based access control (RBAC)?
What is RBAC? (Role Based Access Control)
  • Security

Organizations restrict access permissions in systems to protect sensitive data from unauthorized access and modification. However, assigning access permissions to users individually is a high-maintenance and error-prone process. In the case of role-based access control (RBAC), permissions are assigned based on previously assigned roles. Here, we explain how role-based access control works.

What is RBAC? (Role Based Access Control)
What is IAM (Identity and Access Management)?
What is IAM? (Identity and Access Management)
  • Security

In any system based on user accounts, Identity and Access Management has a role to play. So does every application use IAM? How important are Identity and Access Management systems when it comes to corporate compliance? And what features do these systems offer?

What is IAM? (Identity and Access Management)
What is FIDO2?
What is FIDO2?
  • Security

Passwords are not an ideal way to surf the World Wide Web safely. They are either so complex that they are hard to remember, or so simple that they can be guessed in next to no time. FIDO2 takes a different approach and relies on modern technology. The open standard has the potential to make surfing the net safer and more convenient at the same time.

What is FIDO2?
What is DNS Hijacking?
What is DNS Hijacking?
  • Security

Technically, the Domain Name System (DNS) is a good thing because it allows you to access a website using its URL rather than its IP address. The domain address is then automatically interpreted as an IP address – thanks to the DNS. But despite these performance benefits, the system carries a significant risk: DNS Hijacking. The practice is simple: a hacker accesses a user’s device configuration...

What is DNS Hijacking?
What is DevSecOps?
What is DevSecOps?
  • Security

DevSecOps is the optimal approach for achieving faster software development, without having to make any cutbacks to security. Security packages are directly integrated into the development process. We’ll explain its pros and cons and clarify the various possibilities for using the system.

What is DevSecOps?
What is cybersecurity? The current dangers
What is Cybersecurity?
  • Security

More and more dangers are creeping into the digital world. So it is no surprise that the issue of cybersecurity is gaining more and more weight and is taking a leading role in the fight against cybercrime. But how can you protect yourself from dangers on the network? And what is the current state in the US? We provide you with an overview of this.

What is Cybersecurity?