adesso BLOG
26.04.2024 By Marcel Erfurth
Cybercrime of tomorrow: Trends and dangers of future cyberthreats
In turbulent times, we face numerous challenges: from national conflicts to economic crises. But alongside these problems lurks a growing threat: cybercrime, which is no longer just a playground for hobby hackers, but a field for organised groups with state support. What trends and dangers are we facing? And how can companies protect themselves effectively? I deal with these questions in my blog post.
Read more28.08.2023 By Domenic See and Tobias Dieter
Cyber kill chain
The cyber kill chain framework was developed for use in analysing and defending against cyber attacks. The framework consists of a series of seven steps that describe the typical phases of a cyber attack. I will explain the steps involved and the advantages of this strategy to defend against cyber attacks in more detail in my blog post.
Read more13.04.2022 By Tobias Dieter
Incredible gold finds in Germany! Use this simple hack to become an owner of precious metal.
Well, did I get your attention? Would you have clicked a big button saying ‘read more here’ if it had been placed under this headline? In my blog post, you’ll learn more about some of the methods that are used to digitally manipulate millions of people every day. I’ll explain to you the risks hidden behind these kinds of messages, what’s meant by the terms ‘clickbaiting’ and ‘hoax’ and how you can expose falsehoods and increase your awareness.
Read more31.03.2022 By Lisa Reinhardt
Cybercrime in the era of new work – the show goes on
Cyber criminals are changing their tactics and following us into our offices at home. This also increases the cyber risks posed to our companies. Offices at home can therefore become a gateway for new forms of data theft. Are we now helplessly and capriciously exposed to this data theft?
Read more10.02.2021 By Arman Kohli
Measuring performance against (or just through) security costs
In IT, IT service management (ITSM) is mainly concerned with optimising the quality of IT services. Practice has shown that optimising security management is often more effective at improving information security in the longer term than investing in security technology is. As the focus on ITSM has increased in the IT environment, I’m going to use this blog post to explain how performance measurement and security costs are related in this context.
Read more25.01.2021 By Arman Kohli
Putting the ISO 2700x series to the (practical) test
The security of IT services is always changing Continuously developing an information security management system (ISMS) based on existing standards and tailored adjustments can lead to the information being used securely in the long term. That’s why in this blog post, I explain what’s behind each of the standards in the ISO 2700x series and put them to the test.
Read more