Lots of organizations today rely on cloud services to conduct their business. Due to the increasing complexity of cloud environments, …
Implementation of New IT Solutions: Identifying Vulnerabilities in Time
Implementing new software or applications throughout a company requires detailed planning as well as the consideration of IT security aspects. …
Segmentation in the AWS Cloud – How to Reduce Your PCI DSS Scope
More and more organizations rely on outsourcing processes to the “cloud” in their daily business. The best-known provider and current …
10 Tips for Properly Handling Hacker Attacks
Reality shows that it is no longer sufficient to implement only preventive IT security measures. An attack is only a …
#BeAware: Nothing is impossible
It is widely known that attackers can manipulate USB memory sticks, computer mice or presenter sticks in order to compromise …
Your Certification against PCI PIN – What You Need to Know
Attacks on unsecured or outdated payment terminals have been increasing lately. Therefore, it is more important than ever to secure …
Top 5 Quality Criteria for an Approved Scanning Vendor (ASV)
Corinna Reinheimer, who is in charge of ASV scans at usd AG, tells us the five most important characteristics you …
#BeAware: Tailgating and Piggybacking
Tailgating, also known as Piggybacking, is no trendy new sport, although the name might suggest otherwise. The term refers to …
#BeAware: Cookies
On almost every website, banners and overlays point out that this specific website will save Cookies. But what exactly are …
#BeAware: Have I been pwned?
Time and again we hear of security incidents where millions of data sets have been hacked and published, including account …
- Page 1 of 2
- 1
- 2