Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

The use of artificial intelligence (AI) is also playing an increasingly important role in cyber security. Artificial intelligence shows its strengths above all in the early detection of cyber threats or in the real-time monitoring of IT infrastructures. However, uncontrolled use of AI is definitely dangerous! In this article, you will learn what artificial intelligence can do in the area of cyber security and how AI can support cyber threat hunting and threat intelligence.

With the passed IT Security Act 2.0 (IT-SIG), anomaly detection for CRITIS companies and organisations is enshrined in law. Now it is time for operators of critical infrastructures to act: According to IT-SIG 2.0, they must implement appropriate protective measures to defend against cyber attacks within one year that comply with the current legislation. How can it be done faster?

You are still new to the topic of Cyber Threat Hunting and have many questions that you would like to have answered by a real expert? No one can do this better than a long-standing expert from the Cyber Threat Hunting scene, which originated in the USA: Chris Brenton from Active Countermeasures INC, our partner for Active Cyber Defense, answers the 10 most frequently asked questions about threat hunting in today's blog post.

Ransomware and Advanced Persistent Threats are challenging IT security - and cyberattacks are increasing not only in scope but also in professionalism as technology continues to advance. We present the five most relevant threat actors in the field of cyber threats - and provide tangible tips on which IT security strategies you can use to protect your network most reliably.