The blog about your IT security


Find out about the most important developments in the field of cyber security and
IT risk management to successfully shape the digital transformation of your company.

Filter categories

Current articles in the area

  • 27.04.2023Insights

    Digital extortion: correct behavior before and after a cyber attack

    Growing digitization and the increasing degree of networking in companies go hand in hand with high potential. Many processes can be automated, silos closed and synergies exploited. But where there is light, there is also shadow – and in the case of cybercrime, extorting ransoms in the digital space is an extremely lucrative business. The …

    Weiterlesen …

  • 05.04.2023Insights

    Spoofing: Recognize popular hacker method & effectively protect against attacks

    Large corporations, federal authorities, entire counties – if you look at who was affected by cyberattacks last year, it quickly becomes clear how perfidious the machinations of hackers and criminal gangs are. Using different approaches and subtypes of malware, the attacks are primarily aimed at capturing sensitive data, selling it expensively on the darknet and …

    Weiterlesen …

  • DGC-Cyberinsights-Ransomware

    Ransomware: Increasing threat level for companies

    Rapid technological progress, the polycrisis and a tense geopolitical situation: for cybercriminals, the past few months have truly been stellar. Time and again, hackers – including many now very professionally organized gangs – have succeeded in digitally disabling companies and authorities in the Federal Republic. Only last year, a district in Saxony-Anhalt had to declare …

    Weiterlesen …

  • 10.03.2023Vulnerabilities

    Bitwarden Vulnerability 2023

    Affected products Bitwarden Criticality of the vulnerability(ies) medium Impact Open Source Bitwarden <= 2023.2.1 Description Password managers are basically a useful way to securely protect your credentials. The idea behind a password manager is that it securely stores the credentials for many of your accounts and requires the user to remember only one password (or …

    Weiterlesen …

  • 09.03.2023Company

    Cyber Resilience Act: Growing security requirements for products with digital components

    With the Cyber Resilience Act, or CRA for short, the EU Commission provides for new mandatory security requirements for products with digital elements. We spoke with Ferdinand Grieger, Chief Legal Officer (CLO) of DGC and Chairman of the Supervisory Board of DGC Germany AG, about the changes that manufacturers of hardware and software will face …

    Weiterlesen …

  • IT-Sicherheit für Logistik- und Transportunternehmen

    IT security for logistics and transport companies – How to raise your standards

    Logistics and transport companies are increasingly relying on networking and digital technologies to make processes along their supply chain as efficient, transparent and scalable as possible. This brings IT security further into focus: cyberattacks are considered the greatest threat in the logistics environment. We explain which challenges IT security managers should be prepared for and …

    Weiterlesen …

Do you want to minimize the risks of your digital transformation?

Please get in touch with us.

Subscribe to our newsletter on the topic of cyber security

With our Cyberletter you are always up to date – about vulnerability reports, current IT threat scenarios and other relevant news from the field of cyber security and data security.

With the registration I accept the handling of my personal data (§13 GDPR) and agree to the privacy policy.

Follow us on