Security

What is SIEM (Security Information & Event Management)?

What is SIEM (Security Information & Event Management)?

With timely warnings, cyber threats can be reliably identified and averted. The question is where to get the data from and how to draw the right conclusions. This is where SIEM, short for Security Information & Event Management, comes into play. Any suspicious incidents and…

Read more
What is XDR (Extended Detection and Response)?

What is XDR (Extended Detection and Response)?

Modern IT architectures consist of multiple end devices, applications, clouds and networks. This results in hybrid cyber threats that cannot be reliably fended off with traditional antivirus solutions. XDR (Extended Detection and Response) offers a holistic SaaS security concept…

Read more
What is endpoint security? How to protect your devices

What is endpoint security? How to protect your devices

Company networks should be super secure, yet due to the many endpoint and mobile devices, they sometimes exhibit numerous unexpected security flaws. Endpoint security offers both technical solutions and security management practices to address these vulnerabilities. We outline…

Read more
What is browser hijacking?Billion PhotosShutterstock

What is browser hijacking?

Browser hijacking can enable companies or hackers to seize your sensitive data or even take control of your entire system. In this guide, we’ll delve into what browser hijacking is, what it means for you, the various forms it can assume, and effective strategies to safeguard…

Read more
What is an intrusion detection system (IDS)?

What is an intrusion detection system (IDS)?

An intrusion detection system (IDS) begins its operation at the host, the network, or both, actively examining records in real-time to identify any discernible anomalies. When irregularities are detected, the system promptly sends an alert to the relevant parties, playing a…

Read more
What is an intrusion prevention system?

What is an intrusion prevention system?

In addition to a firewall, an intrusion prevention system (IPS) can monitor either an individual end device or an entire network and alert about potential threats. Unlike intrusion detection systems (IDS) with a similar design, IPS takes a more proactive approach by actively…

Read more
How to convert internationalized domain names with Punycode

How to convert internationalized domain names with Punycode

Since the introduction of internationalized domain names in 2003, Punycode can be seen everywhere on the internet. While internet addresses like "xn--mller-brombel-rmb4fg.de" look peculiar they fulfill an important function. They encode non-ASCII characters into ASCII-compatible…

Read more
How to optimize data synchronization with rsync

How to optimize data synchronization with rsync

rsync is a versatile synchronization tool that simplifies file transfer over network connections and makes synchronizing local directories more robust. With rsync, files can be transferred efficiently between different systems, with only the parts that have actually been changed…

Read more
What is tailgating and how to protect your company

What is tailgating and how to protect your company

While many companies focus on protecting themselves against digital attacks, it’s important not to underestimate the importance of physical security. Tailgating is one such threat. While not based on the latest technology, it still poses a significant danger. We’ll take a look at…

Read more
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.
Page top