ACS – Alliance for Cyber Security
The Alliance for Cyber Security is an initiative of the Federal Office for Information Security (BSI) in Germany, which was launched in 2012. The aim of the Alliance is to inform companies, authorities and other institutions in Germany about current cyber threats and security measures. The alliance offers a platform for the exchange of information […]
BSI – Federal Office for Information Security
What does the Federal Office for Information Security (BSI) do? The BSI is the central cyber security authority in Germany and is responsible for protecting the IT systems and digital security of the federal government, as well as citizens, the economy and critical infrastructures. It develops security standards, analyzes and evaluates threats and vulnerabilities in […]
CISO – Chief Information Security Officer
What does a Chief Information Security Officer (CISO) do? A Chief Information Security Officer (CISO) is responsible for the development, implementation and management of a company’s entire information security strategy. This includes protecting the confidentiality, integrity and availability of data and IT systems. The core tasks of a CISO include identifying potential security threats and […]
Cloud security
How secure is my data in the cloud? The security of data in the cloud depends heavily on the cloud provider chosen and the security measures implemented. In general, cloud providers use a combination of encryption techniques, access controls, network security protocols and redundancy measures to protect data. Many providers have robust security architectures, which […]
Cyber Defense Center (CDC)
What is a Cyber Defense Center (CDC)? A Cyber Defense Center (CDC) is a specialized unit within a company or organization that is specifically set up to detect, analyze and respond to cyber threats at an early stage. A CDC provides the necessary infrastructure to continuously monitor IT systems, identify threats and defend against security […]
NIST – National Institute of Standards and Technology
What is NIST and what is its mission? NIST is an agency of the US Department of Commerce that was founded in 1901. Its original purpose was to develop a uniform system of measurements and standards to improve U.S. industrial competitiveness. Today, NIST develops standards for a variety of areas such as measurement science, technology […]
SOAR – Security Orchestration, Automation and Response
What is SOAR and what is it used for? SOAR is a combination of technologies designed to help security teams manage and respond to threats. It stands for Security Orchestration, Automation, and Response. SOAR combines several key functions: Orchestration: Coordination of security tools to combat threats across different platforms. Automation: Routine tasks such as analyzing […]
SOC – Security Operations Center
What is a Security Operations Center (SOC)? A Security Operations Center (SOC) is a central unit within an organization that is responsible for monitoring, detecting and responding to security threats. It combines specialized staff, processes and technologies to ensure that a company’s digital infrastructure is protected. The SOC acts as the “command center” that continuously […]
SOC 2 Compliance
What is SOC 2 Compliance? SOC 2 (System and Organization Controls 2) is an audit framework developed by the American Institute of Certified Public Accountants (AICPA) to assess whether a service provider has implemented sufficient controls to secure its customers’ data. It focuses on five Trust Service Criteria: security, availability, processing integrity, confidentiality and privacy. […]
Threat Intelligence
What is threat intelligence? Threat Intelligence (TI), or threat intelligence, refers to the collection, analysis and interpretation of information about potential or actual threats that could target a company or organization. The goal is to provide security managers with relevant, actionable information to prevent or respond to attacks. This information can come from a variety […]