2021 was an odyssey with many shock moments from an IT security perspective. Learn more about which IT security trends 2022 has in store for us!
So, you've started your journey to the cloud, experienced the power of identity and access management and are successfully protecting your infrastructure against mean little monsters? Then it's time…
As I discussed in my first blog article, trust and responsibilities play an important role in cloud computing. Compliance with data protection and information security already present various…
Connecting the usable resources is a central point in cloud computing. The connection between the on-premises infrastructure and the cloud environment plays an important role in IT operational tasks,…
“A penetration test is a simulated cyber-attack against ideally all components and applications of an IT system to check for exploitable vulnerabilities.”
In my last blog article, we took a look at an old friend – network security and micro segmentation – and how it takes place in modern times. Setting aside this old but gold approach, let’s travel back…
© 2022 Scheer GmbH
Necessary cookies enable basic functions and are required for the proper functioning of the website.
Statistics Cookies collect information anonymously. This information helps us understand how our visitors use our website.
Marketing cookies come from third party providers, these collect information to play out targeted content.
In order to display content from video platforms and social media platforms, cookies are set by these external media.