adesso BLOG
04.06.2024 By Marc Iridon
Secure Modern Workplace as a competitive advantage
A modern workplace is essential for flexibility and the rapid integration of new technologies, but it also harbours security risks. An effective security strategy must be flexible and quickly adaptable in order to integrate new technologies and ensure data and access security. I explain what this looks like and what needs to be done in my blog post.
Read more15.05.2024 By Edin Mujezinovic
The role of AI in the detection and defence against cyber attacks
We live in a time in which digital networking is constantly increasing and at the same time the number of cyber attacks is rising rapidly. These attacks are becoming increasingly sophisticated and represent a considerable burden for both companies and government organisations. This blog post shows how AI is being used in cybersecurity both as a tool for attackers and as a means of defence.
Read more26.04.2024 By Marcel Erfurth
Cybercrime of tomorrow: Trends and dangers of future cyberthreats
In turbulent times, we face numerous challenges: from national conflicts to economic crises. But alongside these problems lurks a growing threat: cybercrime, which is no longer just a playground for hobby hackers, but a field for organised groups with state support. What trends and dangers are we facing? And how can companies protect themselves effectively? I deal with these questions in my blog post.
Read more28.03.2024 By Oliver Kling
What remains when the secure development process works?
This blog post discusses the security risk of consistently implementing a secure software development process.
Read more10.01.2024 By Oliver Kling
IT security: how can I deal with hundreds of security requirements?
In my blog post, I discuss two approaches to dealing with IT security requirements: traditional requirements engineering for end-to-end documentation and an iterative approach that speeds up IT security integration by carrying out risk assessments early on in the process. Addressing the requirements in an early phase and continuous improvement are prioritised over full and immediate integration. Using suitable tools and continuous monitoring minimise the risks prior to implementation.
Read more05.09.2023 By Oliver Kling
Security professionals and the brain surgeon paradox
What does brain surgery have to do with IT and application security? At first glance, not much. Nevertheless, I would like to look into this comparison in my blog post, because it strongly illustrates the importance of expertise and experience in complex areas.
Read more28.08.2023 By Domenic See and Tobias Dieter
Cyber kill chain
The cyber kill chain framework was developed for use in analysing and defending against cyber attacks. The framework consists of a series of seven steps that describe the typical phases of a cyber attack. I will explain the steps involved and the advantages of this strategy to defend against cyber attacks in more detail in my blog post.
Read more13.04.2022 By Tobias Dieter
Incredible gold finds in Germany! Use this simple hack to become an owner of precious metal.
Well, did I get your attention? Would you have clicked a big button saying ‘read more here’ if it had been placed under this headline? In my blog post, you’ll learn more about some of the methods that are used to digitally manipulate millions of people every day. I’ll explain to you the risks hidden behind these kinds of messages, what’s meant by the terms ‘clickbaiting’ and ‘hoax’ and how you can expose falsehoods and increase your awareness.
Read more26.07.2021 By Philipp Latini
User accounts and inactive access permissions
Digitalisation and cross-hospital and cross-network working are of utmost importance in the hospital world. Above all, it is essential to comply with the requirements of the General Data Protection Regulation (GDPR). In this blog post, we explain how this can be achieved and describe the solutions we offer to support hospitals.
Read more