Kategorie: Experience

  • Next Generation Security Attacks

    What we see right now Hacking Weaknesses in systems are used take over system, intrude the infrastrcture. This is done mostly without human interaction.Prevention is done technically by removeing vulnerabilities.Detection is done by vulnerability scanning and pentesting Phishing Weakness in human behavior is used to intrude systems.Success needs the actice contribution of humans.Prevention is done…

  • How to destroy your Cyber Security

    You found it, you own it This management principle makes the finder of an issue the owner and makes her or him responsible for the fixing.As Cyber Security’s base action is to find weaknesses and 90%+ of these are to be fixed by standard IT Management processes, this principle works as a tar-pit to waste…