Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

The growing number of cyberthreats and cyberattacks is placing ever greater demands on IT security. This now affects all companies - from individual companies to global corporations - primarily due to the high degree of digitalisation. As a result, new professions in IT security are constantly emerging. One of these is the cyber security analyst. A profession with a lot of responsibility, good earning opportunities and, above all, a high degree of future security.

At the beginning of June 2021, the German government extended the "Digital. Secure. Sovereign." by five years. At the same time, funding was increased from 180 to 350 million euros. These funds will flow into IT security research, among other things. Over the next few years, the federal government intends to drive forward IT security research and the digitization of SMEs with targeted funding programs. What funding programs has the federal government decided on and what is their scope?

While manufacturing companies invest extensively in the necessary digital infrastructure for the IIOT (Industrial Internet of Things), IT security usually falls by the wayside. IT security measures against cyber threats and various cyber attacks are too often still based on outdated security concepts. This article explains why multi-layered cyber defence systems are now indispensable and how threat hunting and active cyber defence can significantly increase IT security in a production company.

The entire world is becoming more digital - and this development does not stop at the health sector. The increasingly targeted cyber attacks, which affect the CRITIS sector in particular, make it essential to upgrade IT security in hospitals and similar healthcare facilities. Minimum standards for IT security, CRITIS requirements, certifications and guidelines can significantly increase IT security in a hospital. The central goal is to prevent cyber threats from interfering with daily operations.

I have decided to pursue a career as a pentester. Anyone who wants to work in this professional field must have a natural curiosity as well as in-depth knowledge of IT security and network administration. Creativity and a never-ending drive to achieve one's set goal are also important. In this article, I explain what my everyday life is like, what a pentester earns and what qualifications are necessary.

Kaseya, an IT solutions developer for MSPs and enterprise customers, announced on 2 July that it was the victim of a cyberattack. Cybercriminals exploited a vulnerability in the US IT service provider's VSA management software and targeted hundreds of companies through the supply chain effect. Consequences were felt as far away as Sweden, where the supermarket chain Coop had to close almost all its shops.

It is still unclear which color combination from the party landscape will govern after the federal election. Still, one thing seems certain: Disinformation campaigns and cyberattacks will accompany the online election campaign. At least, that is the conviction of Arne Schönbohm, President of the German Federal Office for Information Security (BSI). But what is the truth behind the fears of manipulation of the Bundestag election, and how secure is the 2021 Bundestag election?

Part of the EU General Data Protection Regulation introduced in 2018 is the obligation to report data security breaches to the competent authority. There is still a lack of clarity for many companies regarding which cyberattacks and IT security incidents are actually reportable. This article provides 18 examples of data breaches that occur in practice and are reportable.

The relevance of a carefully executed IT integration is still underestimated by the management. IT integration must not cost anything and must be completed in the shortest possible time, according to management. The problem is that the dependency of business processes on IT is enormous. This article explains why you have to pay special attention to IT and how you can reliably maintain IT security during a system migration.