Browse through exciting articles, current news and helpful tips & tricks from our experts on all aspects of cybersecurity.
Purple teaming results from the merging of the red (team) and the blue (team) and illustrates how the two teams work together to improve the
The Internet of Things (IoT) is omnipresent, connecting more and more physical devices with the digital world. Nevertheless, the topic of IT security is neglected
The vast majority of companies nowadays use Windows and therefore Active Directory. The default settings are often designed for functionality rather than security. Also, when
Continous Integration (CI) and Continous Deployment (CD) have become important components of software engineering in recent years. Automation enables development teams to deploy new features
Vulnerability scanners are often used during security audits. The goal: to be one step ahead of the cybercriminals!
A bug bounty program and a penetration test are both important measures to improve the security level of a system. However, there are important differentiators