CIS Controls
What are the CIS Controls? The CIS Controls (Center for Internet Security Controls) are a set of proven, prioritized measures and practices to improve cyber security in organizations. They have […]
Cyber Kill Chain
What is the Cyber Kill Chain? The Cyber Kill Chain is a model developed by Lockheed Martin that describes the phases of a cyber attack. It provides a schematic representation […]
DORA – Digital Operational Resilience Act
What is DORA and who does it affect? The Digital Operational Resilience Act (DORA) is an EU regulation that aims to strengthen digital resilience in the financial sector. Resilience refers […]
IT baseline protection
What is IT baseline protection and what are its objectives? IT baseline protection is a comprehensive security standard from the German Federal Office for Information Security (BSI) that helps companies […]
MITRE ATT&CK
What is the MITRE ATT&CK framework? The MITRE ATT&CK framework is a comprehensive, publicly available database that documents cyber attackers’ tactics, techniques and procedures (TTPs) in a standardized and detailed […]
NIS-2 Directive
What is the NIS-2 Directive? The European Union’s NIS-2 (Network and Information Security) Directive is an extension of the original NIS Directive from 2016. The aim is to strengthen the […]
System for attack detection (SZA)
1. what is a system for attack detection (SZA)? An attack detection system (ADS) is a technological and procedural concept for identifying security-relevant events in IT systems and networks. The […]