CYBER RESILIENCE MADE IN GERMANY
Our IT security experts inform you about the current threat situation in the IT sector, present new developments in protection against cyber attacks and explain the most important technical terms.
In March 2022, the European Union and the United States unveiled the follow-up to the Privacy Shield agreement: the Trans-Atlantic Data Privacy Framework. The new agreement, also known as “Privacy Shield 2.0,” is intended to ensure the free and secure exchange of data between the EU and the United States. For more than two years, […]
READ MOREAfter nearly 20+ years of working in the Telecom arena, I’ve seen a number of developments and challenges within the industry. One such challenge has been the advent of SPIT (Spam Over Internet Telephony), which is unsolicited bulk messages sent over a VOIP system and essentially ‚clogging‘ up the VOIP system altogether. While SPIT seems […]
READ MOREWhen cybercriminals combine a DDoS attack with a ransom demand, this is known as a ransom DDoS attack (RDDOS). The damage in such a case can be considerable and should not be taken lightly. Typical distributed denial of service attacks are now part of everyday business life. The numbers are alarmingly high – especially since […]
READ MOREThe HTTP and HTTPS protocols are important for communication on the Internet and are therefore terms often encountered while browsing the net. But what is the difference between these two protocols? We have all the details. As soon as you enter and confirm an address in the web browser, a communication protocol is started in […]
READ MORECAPTCHA is a popular security mechanism that is often used to protect against spam on websites. Almost everyone has had to deal with such verification. CAPTCHA codes come in many different functions and designs – but the bottom line always remains the same: the goal is to keep spam out as much as possible. And […]
READ MORETransport Layer Security (TLS) more commonly referred to as SSL, which is it’s predecessor, is a protocol for encrypting network communication. Whether we realize it or not we use SSL/TLS every time we open our browsers. Website owners and operators have an obligation to ensure they are protecting their user’s data by requiring strong encryption […]
READ MOREThe three terms DDoS, DoS and RDoS look very similar at first glance and also have many things in common, but despite all this they should be evaluated completely differently. All three definitions are digital attack types that cybercriminals are extremely fond of using to cause massive damage to victims. We will explain what the […]
READ MOREI’ve had the opportunity to work within cloud-based DDoS Mitigation Providers for over a decade, and over that time I’ve seen numerous strategies to deal with DDoS put forth by different sectors of the IT industry. Ranging from the traditional ‘big box’ hardware solutions, to public cloud ‘elasticity’, to various Hybrid topologies, every year seems […]
READ MOREDDoS attacks occur in various forms (e.g. ransom DDoS, carpet bombing, etc.) and regularly inflict serious damage on large and small companies all over the world. Attacks become more massive the longer they last The impact of a DDoS attack is directly related to its duration. You can picture what happens in a graph. The […]
READ MOREIn the cybersecurity world, threats are often described as targeting a specific layer. But what does that actually mean? The idea of OSI layers is foundational to computer science as a whole, as it explains how data signals travel from one place to another. In this article, we’ll explain what OSI layers are, the most […]
READ MOREIn recent years, there’s been plenty of hype surrounding CDNs. Once the exclusive domain of huge digital service providers like Facebook, Google, and Netflix, CDNs are now available to any organization (or even individual) that wants one. However, there are several misconceptions about what CDNs are, what they do, and the difference between the CDNs […]
READ MOREIn recent years, organizations worldwide and across all industries have been forced to develop and maintain increasingly tight controls to protect web-based assets against cyber threats. From Web Application Firewalls (WAFs) to DDoS protection services, evolving hacker tactics have forced organizations to continually update their security capabilities to identify and block the latest threats. Malicious […]
READ MORE