Blog

Filter Blog Posts
SOC and cyber insurance in a bundle: securely insured without risk dialogue

NEWS

08.05.2025

SOC and cyber insurance in a bundle: securely insured without risk dialogue

With our bundle of Managed SOC and cyber insurance, companies receive comprehensive technical protection and financial security - without any traditional risk dialogue.

Read More

SOC for IT & OT - Why networked cyber security is indispensable in industry

NEWS

07.04.2025

SOC for IT & OT - Why networked cyber security is indispensable in industry

How can high-availability production facilities be effectively protected against cyber attacks without jeopardising ongoing operations? The answer lies in a SOC that integrates IT and OT holistically.

Read More

Threat Hunting - How proactive cyber security can prevent attacks

CLARIFICATION

28.03.2025

Threat Hunting - How proactive cyber security can prevent attacks

In this interview, expert David Macamo explains why proactive security strategies complement traditional protection measures and how analysts detect hidden threats.

Read More

Effective cyber defence in the SOC through smart detection rules

NEWS

27.03.2025

Effective cyber defence in the SOC through smart detection rules

In the Security Operations Center (SOC), precise detection rules are crucial for detecting cyberattacks at an early stage and minimising false alarms. Find out how detection engineering optimises IT security.

Read More

Cybersecurity is a matter for the boss: Why managing directors need to act now

NEWS

12.03.2025

Cybersecurity is a matter for the boss: Why managing directors need to act now

Digitalisation not only brings opportunities, but also considerable security risks. Today, cybersecurity is a top priority and crucial for the protection of modern companies.

Read More

NIS2 & CRA: What companies need to know now

NEWS

04.02.2025

NIS2 & CRA: What companies need to know now

NIS2 and the Cyber Resiliance Act (CRA) bring new obligations for companies and manufacturers of digital products. Those who act now will strengthen IT security, avoid penalties and remain competitive.

Read More

Security Incident - step by step through the phases of a security incident

INCIDENT RESPONSE MANAGEMENT

04.02.2025

Security Incident - step by step through the phases of a security incident

What are the phases of a security incident - from the initial panic to the long-term integration of security measures? Surviving the incident is one thing, learning from it is another.

Read More

Cyber Resilience Act and the challenges of supply chain security: reporting obligations, verification, standards and OT security

SECURITY SERVICES

27.01.2025

Cyber Resilience Act and the challenges of supply chain security: reporting obligations, verification, standards and OT security

Since December 2024, the Cyber Resiliance Act (CRA) has required clear processes for OT security, reporting obligations and supply chain security in order to effectively manage security gaps and strengthen cyber resilience.

Read More

More than just a policy: the role of cyber insurance for companies

NEWS

06.01.2025

More than just a policy: the role of cyber insurance for companies

Cyber attacks are one of the biggest risks for companies - are you prepared for them? Find out how cyber insurance not only protects your finances, but also strengthens your IT security and makes risks calculable.

Read More

Cybersecurity review of the year 2024

NEWS

16.12.2024

Cybersecurity review of the year 2024

2024 was a turbulent year in cybersecurity

Read More

Why a Security Operations Centre is indispensable

NEWS

12.12.2024

Why a Security Operations Centre is indispensable

How do you protect yourself in a world where cyber attacks have become the biggest threat? Discover why a Security Operations Centre is indispensable today.

Read More

The everyday life of a CISO: from crisis manager to strategist

NEWS

29.11.2024

The everyday life of a CISO: from crisis manager to strategist

Are you a CISO and wondering how you can build a strong cybersecurity strategy with limited resources, convince management and get the workforce on board? You'll find the answers here.

Read More