Inadequate cyber security is one of the biggest risks for companies today. This is the assessment of the World Economic Forum, which ranks cyber...
Security Audits
Secure or Not Secure, That Is the Question: “Cyber Security Assessments in Practice” at TU Munich
What are the different types of cyber security assessments? Why do companies undergo such security assessments? And how exactly does it work? Nico...
Information Security in Third Party Risk Management: The Basics
Companies often work with a large number of service providers in order to be able to concentrate on their core business or save costs. For this to...
Ready for NIS 2? Be the Early Bird!
How to prepare your company for the implementation of the Directive in good time When it comes to implementing the NIS 2 Directive, our experts'...
SWIFT Expert Tip: Combine Your Current SWIFT Assessment with a Gap-Analysis for CSCFv2024
SWIFT users are required by the Customer Security Controls Framework (CSCF) to demonstrate compliance with at least all mandatory controls through...
6 Reasons For a Security Audit
The number of cyberattacks on companies is constantly rising, and the threat level reached a record high last year (source: BSI). The consequences...
Microsoft 365 - Why should your environment be subject to a configuration audit?
Whether you are a large enterprise or a medium-sized business, Microsoft 365 is becoming increasingly popular. Many companies have already ventured...
Cyber Security Check: The 7 most important questions
Cyber security has become a key concern for businesses of all sizes in today's interconnected world, where organizations are increasingly reliant on...
KRITIS: The Critical Infrastructure Growth Spiral
Critical infrastructures form the foundation of our modern society. They ensure the smooth functioning of a wide range of sectors and...
Internal audits according to ISO 27001 - Insights, tips and frequently asked questions
For many companies, preparing for ISO/IEC 27001:2022 (ISO 27001) certification is a major effort. But all the information security management system...
KRITIS: BSI Publishes Basic Requirements in the Verification Procedure
In May 2023, the BSI published binding regulations for KRITIS audits. These Basic Requirements in the Verification Procedure are based on §8a (5)...
How do I become an Auditor?
Are you passionate about both the technical and organizational aspects of cyber security and want to help companies improve their security as an...