Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.

Medien & Inhalte

Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.

Open Threat Exchange

Open Threat Exchange Open Threat Exchange (OTX) is an open platform for sharing information about cyber threats. It is operated by the security company AlienVault (now part of AT&T Cybersecurity)

Weiterlesen »

Open Ports

Open Ports An “open port” is an access point on a computer or server that is reachable and active for traffic. Programs and services communicate with each other via ports

Weiterlesen »

Employee sensitization

Employee sensitization Individual employees are the last line of defense in the IT security of companies. In addition to technical precautions, further training and permanent sensitization of employees is an

Weiterlesen »

Man-in-the-middle attack

Man-in-the-middle attack “Man-in-the-Middle” translates as middleman. Because in such an attack, someone places themselves as a middleman between two communication parties – without their knowledge.The aim is to read the

Weiterlesen »

Malware

Malware Is synonymous with malicious program or malware. For more information, see our glossary entry on malware.

Weiterlesen »

Malvertising

Malvertising Malvertising (a short form of “malicious advertising”) refers to a method in which online advertisements are deliberately misused to spread malware (malware). The ads seem harmless at first glance

Weiterlesen »

Keylogger

Keylogger The term is made up of the English “key”, here for “key” and “logger” for “record, log”. Keyloggers are hardware or software that log inputs from a keyboard. This

Weiterlesen »

Internet of Things (IoT)

Internet of Things (IoT) Internet of Things (IoT) means “Internet of Things”. The term refers to the networking of objects or devices with the Internet. Such devices include, for example,

Weiterlesen »

Incognito mode

Incognito mode Incognito mode (also: “private mode”) is a feature of modern web browsers that allows you to surf the Internet without certain data being permanently stored on the device

Weiterlesen »

Incident Response

Incident Response The English term can be translated as “reaction to an incident”. In IT security, this concerns the response to a cyber incident. This response can be handled by

Weiterlesen »