blog phone

adesso BLOG

Tags:

  • Security

Show all posts
AI

Many companies are just starting out with their first prototypes in the area of large language models. It is a good idea to deal with regulatory and security issues at an early stage. What needs to be considered from the outset, what needs to be done during the course of the project and how can operations be set up securely and in compliance with regulations? Even if not all the details have been clarified in the regulatory area, for example, I would like to address these questions in this blog post.

Read more
Methodology

In IT, IT service management (ITSM) is mainly concerned with optimising the quality of IT services. Practice has shown that optimising security management is often more effective at improving information security in the longer term than investing in security technology is. As the focus on ITSM has increased in the IT environment, I’m going to use this blog post to explain how performance measurement and security costs are related in this context.

Read more
Inside adesso

The security of IT services is always changing Continuously developing an information security management system (ISMS) based on existing standards and tailored adjustments can lead to the information being used securely in the long term. That’s why in this blog post, I explain what’s behind each of the standards in the ISO 2700x series and put them to the test.

Read more