In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Cybersecurity Tips
Software Security: Static Code Analysis
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Software Security: Requirement and Threat Analysis
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Software Security: Anchoring Security in the Corporate Culture
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Software Security: Reasons for More Security
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Chances and Risks of Single Sign-On Solutions
Single Sign-On (SSO) is an authentication method that allows users to log into multiple applications and websites using the same login data. Lauritz...
With the right Cyber Security Strategy towards a secure Digital Transformation
The application of new technologies, the automatisation of processes and the interconnection of value chains determine the everyday work in...
ISMS in a Nutshell - Part 3: Vulnerabilities, Threats, Risks
Information security is first and foremost about protecting your corporate assets. In our mini-series, we explain the terms, concepts and...
ISMS in a Nutshell - Part 2: The ISMS In the Company
Information security is first and foremost about protecting your corporate assets. In our mini-series, we explain terms, concepts and interesting...
More Security on Your Way to the Cloud
Lots of organizations today rely on cloud services to conduct their business. Due to the increasing complexity of cloud environments, assessing...
Implementation of New IT Solutions: Identifying Vulnerabilities in Time
Implementing new software or applications throughout a company requires detailed planning as well as the consideration of IT security aspects. One...
Segmentation in the AWS Cloud – How to Reduce Your PCI DSS Scope
More and more organizations rely on outsourcing processes to the “cloud” in their daily business. The best-known provider and current market leader...