The number of cyberattacks on companies is constantly rising, and the threat level reached a record high last year (source: BSI). The consequences...
Security Audits
Microsoft 365 - Why should your environment be subject to a configuration audit?
Whether you are a large enterprise or a medium-sized business, Microsoft 365 is becoming increasingly popular. Many companies have already ventured...
Cyber Security Check: The 7 most important questions
Cyber security has become a key concern for businesses of all sizes in today's interconnected world, where organizations are increasingly reliant on...
KRITIS: The Critical Infrastructure Growth Spiral
Critical infrastructures form the foundation of our modern society. They ensure the smooth functioning of a wide range of sectors and...
Internal audits according to ISO 27001 - Insights, tips and frequently asked questions
For many companies, preparing for ISO/IEC 27001:2022 (ISO 27001) certification is a major effort. But all the information security management system...
KRITIS: BSI Publishes Basic Requirements in the Verification Procedure
In May 2023, the BSI published binding regulations for KRITIS audits. These Basic Requirements in the Verification Procedure are based on §8a (5)...
How do I become an Auditor?
Are you passionate about both the technical and organizational aspects of cyber security and want to help companies improve their security as an...
SWIFT Assessments: The 7 Most Important Questions
The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a global membership cooperative that provides secure financial messaging...
Secure in the Cloud: Myra Security Achieves BSI C5 Attestation
Security technology manufacturer and Security-as-a-Service provider Myra Security demonstrates security in the cloud. In partnership with the...
usd AG Offers Assessment according to SWIFT Customer Security Controls Framework (CSCF)
SWIFT has become an integral part of international payment traffic. The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a...
Implementation of New IT Solutions: Identifying Vulnerabilities in Time
Implementing new software or applications throughout a company requires detailed planning as well as the consideration of IT security aspects. One...
Cyber Security Check Helps Achieve Transparency in Potential IT Risks
With increasing digitalization and more complex IT environments, it is becoming more and more difficult for companies to maintain an overview of the...