Cyber Security

CYBER RESILIENCE MADE IN GERMANY

Our IT security experts inform you about the current threat situation in the IT sector, present new developments in protection against cyber attacks and explain the most important technical terms.

A secure data exchange between the EU and the USA: A never-ending story and why “Made in Germany” offers a solution

Cyber Security

A secure data exchange between the EU and the USA: A never-ending story and why “Made in Germany” offers a solution

  • Lisa Fröhlich
  • October 31, 2022

In March 2022, the European Union and the United States unveiled the follow-up to the Privacy Shield agreement: the Trans-Atlantic Data Privacy Framework. The new agreement, also known as “Privacy Shield 2.0,” is intended to ensure the free and secure exchange of data between the EU and the United States. For more than two years, […]

READ MORE
VOIP and DOS / SPIT – History and Challenges

Cyber Security

VOIP and DOS / SPIT – History and Challenges

  • Erol Erdogan
  • June 28, 2022

After nearly 20+ years of working in the Telecom arena, I’ve seen a number of developments and challenges within the industry. One such challenge has been the advent of SPIT (Spam Over Internet Telephony), which is unsolicited bulk messages sent over a VOIP system and essentially ‚clogging‘ up the VOIP system altogether. While SPIT seems […]

READ MORE
What is Ransom DDoS?

Cyber Security

What is Ransom DDoS?

  • Fabian Sinner
  • June 20, 2022

When cybercriminals combine a DDoS attack with a ransom demand, this is known as a ransom DDoS attack (RDDOS). The damage in such a case can be considerable and should not be taken lightly. Typical distributed denial of service attacks are now part of everyday business life. The numbers are alarmingly high – especially since […]

READ MORE
HTTP and HTTPS: What is the difference?

Cyber Security

HTTP and HTTPS: What is the difference?

  • Fabian Sinner
  • June 14, 2022

The HTTP and HTTPS protocols are important for communication on the Internet and are therefore terms often encountered while browsing the net. But what is the difference between these two protocols? We have all the details. As soon as you enter and confirm an address in the web browser, a communication protocol is started in […]

READ MORE
What is Captcha and how does it work?

Cyber Security

What is Captcha and how does it work?

  • Fabian Sinner
  • June 3, 2022

CAPTCHA is a popular security mechanism that is often used to protect against spam on websites. Almost everyone has had to deal with such verification. CAPTCHA codes come in many different functions and designs – but the bottom line always remains the same: the goal is to keep spam out as much as possible. And […]

READ MORE
SSL/TLS: Overview and history including noteworthy threats

Cyber Security

SSL/TLS: Overview and history including noteworthy threats

  • Sean Power
  • April 25, 2022

Transport Layer Security (TLS) more commonly referred to as SSL, which is it’s predecessor, is a protocol for encrypting network communication. Whether we realize it or not we use SSL/TLS every time we open our browsers. Website owners and operators have an obligation to ensure they are protecting their user’s data by requiring strong encryption […]

READ MORE
DoS, DDoS und RDoS – What is the difference?

Cyber Security

DoS, DDoS und RDoS – What is the difference?

  • Fabian Sinner
  • April 11, 2022

The three terms DDoS, DoS and RDoS look very similar at first glance and also have many things in common, but despite all this they should be evaluated completely differently. All three definitions are digital attack types that cybercriminals are extremely fond of using to cause massive damage to victims. We will explain what the […]

READ MORE
Telcos and Mitigation: The Challenges with Telecom Carrier DDoS Mitigation Solutions

Cyber Security

Telcos and Mitigation: The Challenges with Telecom Carrier DDoS Mitigation Solutions

  • Jag Bains
  • March 1, 2022

I’ve had the opportunity to work within cloud-based DDoS Mitigation Providers for over a decade, and over that time I’ve seen numerous strategies to deal with DDoS put forth by different sectors of the IT industry. Ranging from the traditional ‘big box’ hardware solutions, to public cloud ‘elasticity’, to various Hybrid topologies, every year seems […]

READ MORE
DDoS mitigation: Why time is critical

Cyber Security

DDoS mitigation: Why time is critical

  • Fabian Sinner
  • January 21, 2022

DDoS attacks occur in various forms (e.g. ransom DDoS, carpet bombing, etc.) and regularly inflict serious damage on large and small companies all over the world. Attacks become more massive the longer they last The impact of a DDoS attack is directly related to its duration. You can picture what happens in a graph. The […]

READ MORE
What is a Network Layer? (OSI Model Explained)

Cyber Security

What is a Network Layer? (OSI Model Explained)

  • Katrin Graewe
  • September 10, 2021

In the cybersecurity world, threats are often described as targeting a specific layer. But what does that actually mean? The idea of OSI layers is foundational to computer science as a whole, as it explains how data signals travel from one place to another. In this article, we’ll explain what OSI layers are, the most […]

READ MORE
What is a Secure CDN and How Does it Work?

Cyber Security

What is a Secure CDN and How Does it Work?

  • Katrin Graewe
  • September 10, 2021

In recent years, there’s been plenty of hype surrounding CDNs. Once the exclusive domain of huge digital service providers like Facebook, Google, and Netflix, CDNs are now available to any organization (or even individual) that wants one. However, there are several misconceptions about what CDNs are, what they do, and the difference between the CDNs […]

READ MORE
What is Bot Management (and What Does it Do?)

Cyber Security

What is Bot Management (and What Does it Do?)

  • Katrin Graewe
  • September 10, 2021

In recent years, organizations worldwide and across all industries have been forced to develop and maintain increasingly tight controls to protect web-based assets against cyber threats. From Web Application Firewalls (WAFs) to DDoS protection services, evolving hacker tactics have forced organizations to continually update their security capabilities to identify and block the latest threats. Malicious […]

READ MORE
X
This site is registered on wpml.org as a development site.