Valentin Ehkirch

IT und Covid-19 – CIS controls v8 – a view into the changing landscape of IT Security

Insufficient measures to adequately protect data prompted the EU Court of Justice to place focus on non-EU/CH countries’ service providers, technical solutions, and anonymization to protect sensitive data.

Anna Mempel

Jump-starting your security strategy

Automation in the cyber-crime environment is on the rise. With Arco and Securnite solutions, vulnerabilities and attacks can be easily handled.

Bertil Strub

IT Security from a Software Sourcing Perspective is Vulnerability Avoidance

Security risks generated by lack of coordination and non-resourceful purchases highlight the need for the management tools for maximum optimization.

Nicole Beranek Zanon

Data security with data transfers to non-EU/CH countries – Legal and IT concerns

Insufficient measures to adequately protect data prompted the EU Court of Justice to place focus on non-EU/CH countries’ service providers, technical solutions, and anonymization to protect sensitive data.

Hannes P. Lubich

IT und Covid-19 – An initial assessment in 5 theses

Growing tolerance for insecure IT architectures and inflexible company pandemic- plans are the leading cause of companies rethinking their data protection and IT security.