CYBER RESILIENCE MADE IN GERMANY
Our IT security experts inform you about the current threat situation in the IT sector, present new developments in protection against cyber attacks and explain the most important technical terms.
Cyber threats cause major problems for individuals and businesses in the digital age. These multiple threats can mean financial losses, cause reputational damage, or compromise sensitive data. Some cyber threats, such as “credential stuffing” or “spambot spamming,” can result in consequences that are equally associated with Distributed Denial of Service (DDoS) attacks. Even legal methods […]
READ MOREIn a recent discussion with colleagues, we talked about what motivates cybercriminals to attack companies or government agencies. Our discussion revealed that in many cases, the motivation is either financial, based on youthful recklessness, or, very topical now, based on the attacker’s political persuasion. In all cases, the impact of these attacks can result in […]
READ MOREDenial of Service attacks are an unfortunate reality everyone on the internet is faced with. And for whatever reason, it is a topic that victims are reluctant to discuss openly. So when it does occur many organizations are unfortunately under prepared. The costs of a DDoS attack are manifold When calculating the cost of a […]
READ MOREBefore Easter, there was a series of DDoS attacks on websites operated by state authorities and the police. The attackers’ targets included, for example, the state portals of Saxony-Anhalt and Schleswig-Holstein and the websites of the police in Brandenburg and Lower Saxony. There were also similar reports from Mecklenburg-Western Pomerania and the German Federal Ministry […]
READ MOREIn recent years, many companies have relied on a content delivery network (CDN) for better website performance and combined it with web DDoS protection, usually from the same provider, to secure their websites and applications. However, more and more European enterprises are increasingly selecting European Union (EU)-based providers rather than relying on non-European protection solutions. […]
READ MOREDDoS protection is not a “one size fits all” product, and in the event of an attack, the pressure to find a solution increases. Often, it’s a matter of an ad hoc available – in doubt, any – solution. Unfortunately, an unsuitable solution provides minimal protection at best and at worst, victims of a DDoS […]
READ MOREOn November 10, 2022, the European Parliament in Brussels approved the draft for the revised Network and Information Systems Security Directive (NIS2). The new directive is intended to better protect European network and information systems from hacker attacks. Once the directive becomes law as new legislation, all 27 EU member states must incorporate the requirements […]
READ MOREIn March 2022, the European Union and the United States unveiled the follow-up to the Privacy Shield agreement: the Trans-Atlantic Data Privacy Framework. The new agreement, also known as “Privacy Shield 2.0,” is intended to ensure the free and secure exchange of data between the EU and the United States. For more than two years, […]
READ MOREAfter nearly 20+ years of working in the Telecom arena, I’ve seen a number of developments and challenges within the industry. One such challenge has been the advent of SPIT (Spam Over Internet Telephony), which is unsolicited bulk messages sent over a VOIP system and essentially ‚clogging‘ up the VOIP system altogether. While SPIT seems […]
READ MOREWhen cybercriminals combine a DDoS attack with a ransom demand, this is known as a ransom DDoS attack (RDDOS). The damage in such a case can be considerable and should not be taken lightly. Typical distributed denial of service attacks are now part of everyday business life. The numbers are alarmingly high – especially since […]
READ MOREThe HTTP and HTTPS protocols are important for communication on the Internet and are therefore terms often encountered while browsing the net. But what is the difference between these two protocols? We have all the details. As soon as you enter and confirm an address in the web browser, a communication protocol is started in […]
READ MORECAPTCHA is a popular security mechanism that is often used to protect against spam on websites. Almost everyone has had to deal with such verification. CAPTCHA codes come in many different functions and designs – but the bottom line always remains the same: the goal is to keep spam out as much as possible. And […]
READ MORE