Firewalls & Firewall-Architecture
How does a firewall actually work? What does a good enterprise firewall architecture look like? To what extent does appropriate network segmentation help defend against threats?
How does a firewall actually work? What does a good enterprise firewall architecture look like? To what extent does appropriate network segmentation help defend against threats?
The CIS Critical Security Controls (CIS Controls) are a prioritized list of protective measures to defend against the most common cyber attacks on IT systems.
Information security is intended to ensure the confidentiality, integrity and availability of information. The information can be available on IT systems or in non-digital form.
An Information Security Management System (ISMS) defines methods to ensure information security in an organisation.
The CVSS Score provides a numerical representation (0.0 to 10.0) of the severity of a security vulnerability in IT. We explain how the Common Vulnerability Scoring System works, how CVSS should be...
In this article, we explain what NTLM authentication is, how it works, and how it can be exploited by attackers.
Vulnerability scanners are automated tools that organisations can use to monitor their networks, systems and applications for security weaknesses. Vulnerability scanning is a best practice in...
The need-to-know principle describes a security objective for confidential information. Access should only be granted to a user if the information is immediately needed to perform a task.
A proxy server works as an intermediary between two IT systems. Proxy servers offer different functionalities, improved security and optimised data protection depending on the application, need or...
The MITRE ATT&CK Framework is a continuously updated knowledge base consisting of cyber attacker tactics and techniques across the attack lifecycle.
A proxy server works as an intermediary between two IT systems. Proxy servers offer different functionalities, improved security and optimised data protection depending on the application, need or...
A cybersecurity security concept refers to guidelines that are intended to ensure IT security in the company. It is about ensuring the availability, integrity and confidentiality of company data,...
A buffer overflow is a programming error that can be exploited by hackers to gain unauthorized access to IT systems. It is one of the best-known security vulnerabilities in software, yet it is...
An attack vector is a way for attackers to penetrate a network or IT system. Typical attack vectors include ...,
Authentication and authorization are two words used in IT-Security. They might sound similar but are completely different from each other. Authentication is used to authenticate someone's identity....
Data security is an important topic for all companies and authorities. Learn more about threats, measures and the legal framework here.