Mobile Device Management (MDM)
What is Mobile Device Management (MDM)? Mobile Device Management (MDM) is a central solution for managing and securing mobile devices used in a company. This includes smartphones, tablets and laptops. The primary goals of MDM are to control devices and their use, ensure compliance with company policies and protect sensitive data from unauthorized access. MDM […]
OTX – Open Threat Exchange
What is Open Threat Exchange (OTX)? OTX is a threat intelligence-based platform provided by AlienVault. It enables security researchers and companies to share threat intelligence worldwide. The special thing about OTX is that it is freely accessible and comprises a community of over 180,000 users who share information about threats such as malware, phishing, botnets […]
Penetration test
What is a penetration test? A penetration test, often referred to as a pentest, is an authorized and planned simulation of an attack on an IT system. The aim is to uncover vulnerabilities in the systems, networks, web applications or other IT components that potential attackers could exploit. The test is carried out in a […]
Phishing simulation
What is a phishing simulation? A phishing simulation is a methodical exercise in which targeted fake phishing emails are sent within a company or organization. The aim is to test and increase employee awareness of cyber threats. These simulated attacks mimic real phishing emails to observe and analyze the reactions of the workforce. Findings from […]
Proxy server
What is a proxy server and how does it work? A proxy server is an intermediary between an end device and the internet. Requests from a device (e.g. to a website) are first sent to the proxy, which forwards the request and returns the server’s response. How it works: Intermediate station: The proxy “masks” the […]
Quishing
What exactly is quishing? Quishing is a form of phishing in which QR codes are used to lure victims to fake or malicious websites. “Quishing” is made up of “QR” (for QR code) and “phishing”. The attackers pretend to be using a legitimate application, but the QR code leads to a malicious website through which […]
SSL Offloading
What is SSL Offloading and why is it important for cyber security? SSL offloading refers to the process of offloading the encryption and decryption of SSL/TLS traffic from a server to another device, such as a load balancer. This technique reduces the load on the application server and improves performance as the computationally intensive SSL/TLS […]