Zero Trust – trust no one?

Zero Trust – trust no one?

It seems like Zero Trust technology is the silver bullet to solve all security challenges in a corporate network. But what exactly is Zero Trust, why should it be used, and how does it protect the assets? First, Zero Trust is not technology at all. John Kindervag...
Secure the modern workplace!

Secure the modern workplace!

Why now? Working from home was once considered a luxury. It became a necessity, with individuals all around the world being quarantined due to the coronavirus. This is a game-changer not only for workers in the world’s wealthiest countries (where the largest...
Social Media Monitoring: A Cybersecurity Approach

Social Media Monitoring: A Cybersecurity Approach

Social Media Monitoring is used in cybersecurity to detect and prevent threats from social media or other social interaction channels like forums or chatrooms. This should not be confused with social media intelligence which sounds similar but is an entirely different...
API – the neglected IT vulnerability?

API – the neglected IT vulnerability?

A couple of years ago, almost every IT system was a dedicated standalone solution with only one purpose . Calculating the best path for the first NASA moon mission or creating a digital weather forecast for the first time in history. All those systems did not  need to...
The Three Lines of Defense model and its challenges

The Three Lines of Defense model and its challenges

In one of our latest blog post, we gave an overview of how the Three-Lines-of-Defense (3LoD) model can be used risk management (The Three Lines of Defense model). This post addresses the challenges of the model and how it can be improved. Criticism and Problems The...