Firewalls & Firewall-Architecture

How does a firewall actually work? What does a good enterprise firewall architecture look like? To what extent does appropriate network segmentation help defend against threats?

What is Information Security?

Information security is intended to ensure the confidentiality, integrity and availability of information. The information can be available on IT systems or in non-digital form.

Top 10 Vulnerability Scanners for 2022

Vulnerability scanners are automated tools that organisations can use to monitor their networks, systems and applications for security weaknesses. Vulnerability scanning is a best practice in...

Need to Know Principle

The need-to-know principle describes a security objective for confidential information. Access should only be granted to a user if the information is immediately needed to perform a task.

Endpoint Security

A proxy server works as an intermediary between two IT systems. Proxy servers offer different functionalities, improved security and optimised data protection depending on the application, need or...

What is MITRE ATT&CK?

The MITRE ATT&CK Framework is a continuously updated knowledge base consisting of cyber attacker tactics and techniques across the attack lifecycle.

Proxy Server

A proxy server works as an intermediary between two IT systems. Proxy servers offer different functionalities, improved security and optimised data protection depending on the application, need or...

Cybersecurity concept in 8 steps

A cybersecurity security concept refers to guidelines that are intended to ensure IT security in the company. It is about ensuring the availability, integrity and confidentiality of company data,...

Buffer Overflow

A buffer overflow is a programming error that can be exploited by hackers to gain unauthorized access to IT systems. It is one of the best-known security vulnerabilities in software, yet it is...

We use cookies to improve user experience and analyze website traffic. Read about how we use cookies and how you can control them by clicking "Privacy Preferences".

Privacy Preferences I Agree

Privacy Preferences

When you visit any website, it may store or retrieve information through your browser, usually in the form of cookies. Since we respect your right to privacy, you can choose not to permit data collection from certain types of services. However, not allowing these services may impact your experience.