TechTalk

In order to minimize monetary and reputational damage in the event of a successful IT security attack, immediate and correct response measures, a comprehensive overview of the extent of the cyber attack, and a full clarification of the incident are indispensable.
Due to recent events, the SECUINFRA Falcon Team strongly recommends updating the firmware of VPN/remote access solutions from the manufacturers SonicWall, Fortinet and Citrix.
Many KRITIS companies face the challenge of meeting the requirements of the IT Security Act 2.0.
Fully or co-managed detection & response service - in this article you can find out how these two approaches differ and when which service makes sense for your company.
In contrast to SIEM, log management plays a rather subordinate role in the IT security context. This is not entirely justified, because it offers many advantages that are otherwise associated with the topic of SIEM.
EDR, XDR or MDR are currently considered relevant security responses to current and future threats.
What exactly does Security-as-a-Service mean and which IT security services can actually be outsourced?
OT security - i.e. the protection of operational technology, production facilities, industrial plants or infrastructure facilities - is still in the shadows.
Why do so few women work in IT? When I started working on this text, I realized once again that as a woman in the IT industry, I will still be part of a small minority in 2022.
SOAR helps security analysts to focus on the important information and events and to avert potential IT security incidents in a targeted manner.
Cookie Consent with Real Cookie Banner