blog phone

adesso BLOG

Tags:

  • IT-Security

Show all posts
Methodology

A modern workplace is essential for flexibility and the rapid integration of new technologies, but it also harbours security risks. An effective security strategy must be flexible and quickly adaptable in order to integrate new technologies and ensure data and access security. I explain what this looks like and what needs to be done in my blog post.

Read more
AI

We live in a time in which digital networking is constantly increasing and at the same time the number of cyber attacks is rising rapidly. These attacks are becoming increasingly sophisticated and represent a considerable burden for both companies and government organisations. This blog post shows how AI is being used in cybersecurity both as a tool for attackers and as a means of defence.

Read more
Methodology

In turbulent times, we face numerous challenges: from national conflicts to economic crises. But alongside these problems lurks a growing threat: cybercrime, which is no longer just a playground for hobby hackers, but a field for organised groups with state support. What trends and dangers are we facing? And how can companies protect themselves effectively? I deal with these questions in my blog post.

Read more
Methodology

This blog post discusses the security risk of consistently implementing a secure software development process.

Read more
Inside adesso

In my blog post, I discuss two approaches to dealing with IT security requirements: traditional requirements engineering for end-to-end documentation and an iterative approach that speeds up IT security integration by carrying out risk assessments early on in the process. Addressing the requirements in an early phase and continuous improvement are prioritised over full and immediate integration. Using suitable tools and continuous monitoring minimise the risks prior to implementation.

Read more
Inside adesso

What does brain surgery have to do with IT and application security? At first glance, not much. Nevertheless, I would like to look into this comparison in my blog post, because it strongly illustrates the importance of expertise and experience in complex areas.

Read more
Methodology

28.08.2023 By Domenic See and Tobias Dieter

Cyber kill chain

Picture

The cyber kill chain framework was developed for use in analysing and defending against cyber attacks. The framework consists of a series of seven steps that describe the typical phases of a cyber attack. I will explain the steps involved and the advantages of this strategy to defend against cyber attacks in more detail in my blog post.

Read more
Inside adesso

Well, did I get your attention? Would you have clicked a big button saying ‘read more here’ if it had been placed under this headline? In my blog post, you’ll learn more about some of the methods that are used to digitally manipulate millions of people every day. I’ll explain to you the risks hidden behind these kinds of messages, what’s meant by the terms ‘clickbaiting’ and ‘hoax’ and how you can expose falsehoods and increase your awareness.

Read more
Industries

Digitalisation and cross-hospital and cross-network working are of utmost importance in the hospital world. Above all, it is essential to comply with the requirements of the General Data Protection Regulation (GDPR). In this blog post, we explain how this can be achieved and describe the solutions we offer to support hospitals.

Read more