Security

Horse whisperer in action: What a project controller must be able to do

Horse whisperer in action: What a project controller must be able to do

Document management: ECM projects defy the economic situation

Document management: ECM projects defy the economic situation

Despite the crisis: no loss of IT service quality!

Despite the crisis: no loss of IT service quality!

Study by COMPUTERWOCHE and CIO: Cloud Security with letter and seal

Study by COMPUTERWOCHE and CIO: Cloud Security with letter and seal

Study by COMPUTERWOCHE and CIO: Cloud Security is transforming

Study by COMPUTERWOCHE and CIO: Cloud Security is transforming

Multi-Cloud Management: Azure Arc pushes Microsoft into the center of hybrid cloud environments

Multi-Cloud Management: Azure Arc pushes Microsoft into the center of hybrid cloud environments

Access Control and User Experience: Building Trust in a Zero Trust Environment

Access Control and User Experience: Building Trust in a Zero Trust Environment

Security: The printer as a Trojan horse

Security: The printer as a Trojan horse

Study by COMPUTERWOCHE and CIO: Endpoint Security needs automation and training

Study by COMPUTERWOCHE and CIO: Endpoint Security needs automation and training

Fictitious self-employment: Christmas party in the sights of the pension insurance

Fictitious self-employment: Christmas party in the sights of the pension insurance

Protection against SQL injection: This is how the attack on your database works

Protection against SQL injection: This is how the attack on your database works

How Macro Viruses Are Made: The Malware Melting Pot

How Macro Viruses Are Made: The Malware Melting Pot

Good and bad reasons: price reduction - with discounts to ruin

Good and bad reasons: price reduction - with discounts to ruin

Expensive and Complex: The 11 Most Common Errors Via Email Encryption

Expensive and Complex: The 11 Most Common Errors Via Email Encryption

Antivirus & Firewall: Web Authentication: Why the password will not die out so fast

Antivirus & Firewall: Web Authentication: Why the password will not die out so fast

Tips and tricks: 10 ways to protect yourself from ransomware

Tips and tricks: 10 ways to protect yourself from ransomware

Process Management: Entry into Process Mining

Process Management: Entry into Process Mining

Comprehensive New Study: Exciting as a Thriller: The Global Password Security Report 2019

Comprehensive New Study: Exciting as a Thriller: The Global Password Security Report 2019

Tips and tricks: How to save your holiday relaxation in the company

Tips and tricks: How to save your holiday relaxation in the company

Process visualization via software: What exactly is behind Process Mining?

Process visualization via software: What exactly is behind Process Mining?

Serverless architecture FAQ: Serverless computing easily explained

Serverless architecture FAQ: Serverless computing easily explained

IaaS Security: Seven measures for better cloud security

IaaS Security: Seven measures for better cloud security

Bullying in the workplace: What people need to know about bullying

Bullying in the workplace: What people need to know about bullying

Switch to AWS cloud services: Amazon shuts down Oracle's last database

Switch to AWS cloud services: Amazon shuts down Oracle's last database

Digital Twins Legal FAQ: The Digital Twin from a legal perspective

Digital Twins Legal FAQ: The Digital Twin from a legal perspective

FAQ Compliance Management: Implement compliance management correctly

FAQ Compliance Management: Implement compliance management correctly

Single Sign-On: Wunderwaffe SSO?

Single Sign-On: Wunderwaffe SSO?

Antivirus & Firewall: Surf safely - these tools turn your computer into a Fort Knox

Antivirus & Firewall: Surf safely - these tools turn your computer into a Fort Knox

Triad of IT security: identities, artificial intelligence and diversity

Triad of IT security: identities, artificial intelligence and diversity

IT industry: The wildest conspiracy theories ever

IT industry: The wildest conspiracy theories ever

Platform as a Service: What is PaaS? - Software development in the cloud

Platform as a Service: What is PaaS? - Software development in the cloud

DSGVO fines: GDPR violations are becoming more expensive

DSGVO fines: GDPR violations are becoming more expensive

Datenklau: Employees who became Innentätern

Datenklau: Employees who became Innentätern

Identity & Access Management FAQ: What you need to know about IAM

Identity & Access Management FAQ: What you need to know about IAM

COMPUTER WEEK Roundtable Discussion: Endpoint Security is the beginning of it all

COMPUTER WEEK Roundtable Discussion: Endpoint Security is the beginning of it all

Security Know-How: Advanced Persistent Threats (APTs) explained

Security Know-How: Advanced Persistent Threats (APTs) explained

Cloud Storage: The Future of Cloud and Data Centers

Cloud Storage: The Future of Cloud and Data Centers

Cloud infrastructures put to the test: Using the right cloud potential

Cloud infrastructures put to the test: Using the right cloud potential

TechEd 2019: SAP launches Business Technology Platform

TechEd 2019: SAP launches Business Technology Platform

Workaholic: This is how working addicts get their lives under control again

Workaholic: This is how working addicts get their lives under control again

Stress at work: How to avoid burn-out traps

Stress at work: How to avoid burn-out traps

In two and a half years as IT security expert: Telekom qualifies security professionals

In two and a half years as IT security expert: Telekom qualifies security professionals

Security startup from Munich: IDEE wins UP19 @ it-sa

Security startup from Munich: IDEE wins UP19 @ it-sa

Startups @ it-sa 2019: Security meets LevelUP!

Startups @ it-sa 2019: Security meets LevelUP!

Bitkom pulls DSGVO balance: GDPR annoying and prevents innovation

Bitkom pulls DSGVO balance: GDPR annoying and prevents innovation

Software development in the cloud: cloud native - what's behind the buzzword?

Software development in the cloud: cloud native - what's behind the buzzword?

Further education for IT security professionals: Specialist for IT security: A job profile with many faces

Further education for IT security professionals: Specialist for IT security: A job profile with many faces

Secure AI ?: Every bug in today's software harbors the security holes of tomorrow

Secure AI ?: Every bug in today's software harbors the security holes of tomorrow

Account hacked despite 2FA ?: Two-factor authentication with pitfalls

Account hacked despite 2FA ?: Two-factor authentication with pitfalls

ECJ vs.. Opt-out procedure: No cookie without consent!

ECJ vs.. Opt-out procedure: No cookie without consent!

IT Security: 5 top threats to your IT

IT Security: 5 top threats to your IT

Door to Cloud Computing: Cloud providers need PaaS

Door to Cloud Computing: Cloud providers need PaaS

Challenge and opportunity for the software industry: PaaS in Germany

Challenge and opportunity for the software industry: PaaS in Germany

IT compliance: How to use the concept of the COBIT 5 enabler

IT compliance: How to use the concept of the COBIT 5 enabler

Security in the Cloud: Six Steps to More Cloud Security

Security in the Cloud: Six Steps to More Cloud Security

Materials Management, Controlling, Accounting: What does ERP do as software as a service?

Materials Management, Controlling, Accounting: What does ERP do as software as a service?

Competing in Cloud Computing: Fiercely competitive cloud market

Competing in Cloud Computing: Fiercely competitive cloud market

PAC survey: Companies arm themselves for big data

PAC survey: Companies arm themselves for big data

IDC study on big data: Companies need to ride this wave

IDC study on big data: Companies need to ride this wave

Cloud Offer from Amazon: AWS is Pushing into Enterprise IT

Cloud Offer from Amazon: AWS is Pushing into Enterprise IT

FAQ Big Data: Hadoop - the little elephant for big data

FAQ Big Data: Hadoop - the little elephant for big data

From e-commerce giant to cloud primus: Amazon - the secret superpower

From e-commerce giant to cloud primus: Amazon - the secret superpower

Defying Burnout: How CIOs recover

Defying Burnout: How CIOs recover

Securing with on-board resources: The most important security tips for Windows

Securing with on-board resources: The most important security tips for Windows

Breaking into the Cloud: Pioneers Explore the IT Cloud

Breaking into the Cloud: Pioneers Explore the IT Cloud

Cloud computing, ebook, social software: Gartner names the hottest IT trends for 2009

Cloud computing, ebook, social software: Gartner names the hottest IT trends for 2009

Security Guide: Best Practices for More Security on Windows

Security Guide: Best Practices for More Security on Windows

Cognitive Computing: Algorithms in Strategic Planning

Cognitive Computing: Algorithms in Strategic Planning

Cloud instead of communication infrastructure: communication and collaboration from the cloud

Cloud instead of communication infrastructure: communication and collaboration from the cloud

Königsweg Private Cloud: Private Cloud

Königsweg Private Cloud: Private Cloud

Savings through Cloud Migration: Cost Factors in the Cloud

Savings through Cloud Migration: Cost Factors in the Cloud

How much does the cloud cost: cloud computing in the cost check

How much does the cloud cost: cloud computing in the cost check

Companies under continuous fire: Staff shortage in cyber defense

Companies under continuous fire: Staff shortage in cyber defense

Strong networking: the Internet of Things challenges security

Strong networking: the Internet of Things challenges security

The Federal Office for Security in Information Technology introduces itself: BSI: Working at the national cyber security authority

The Federal Office for Security in Information Technology introduces itself: BSI: Working at the national cyber security authority

High maintenance prices annoy customers: Sage quietly says hello to the Classic Line

High maintenance prices annoy customers: Sage quietly says hello to the Classic Line

Patch Tuesday: Microsoft closes critical vulnerability in Internet Explorer

Patch Tuesday: Microsoft closes critical vulnerability in Internet Explorer

ECJ sets rules: be careful when dismissing sick employees

ECJ sets rules: be careful when dismissing sick employees

Legal Advice: Stealing Images on the Internet - And What Now?

Legal Advice: Stealing Images on the Internet - And What Now?

Copyright Infringement: EU Court of Justice Ruling on Blocking Illegal Websites

Copyright Infringement: EU Court of Justice Ruling on Blocking Illegal Websites

CeBIT 2014: Trend Micro wants to secure company data on private mobile phones

CeBIT 2014: Trend Micro wants to secure company data on private mobile phones

Patch Tuesday: Microsoft closes many critical holes in Internet Explorer

Patch Tuesday: Microsoft closes many critical holes in Internet Explorer

Patent litigation: US jury awards Apple $ 290 million from Samsung

Patent litigation: US jury awards Apple $ 290 million from Samsung

How much does Apple have to pay ?: Next damage claim process of Apple and Samsung begins

How much does Apple have to pay ?: Next damage claim process of Apple and Samsung begins

IAM from a distributor point of view: strong authentication becomes mandatory

IAM from a distributor point of view: strong authentication becomes mandatory

Much more than antivirus and patches ...: Tips & Tricks to protect your own infrastructure

Much more than antivirus and patches ...: Tips & Tricks to protect your own infrastructure

Controversy at work: No mobile phone at work - is that right?

Controversy at work: No mobile phone at work - is that right?

Secure rights from the start: Tips for trademark protection

Secure rights from the start: Tips for trademark protection

Bitkom informs: That will change in 2013

Bitkom informs: That will change in 2013

DDoS attack on Soca: Hackers paralyze UK police department website

DDoS attack on Soca: Hackers paralyze UK police department website

LÜKEX 2011: The simulated cyberattack

LÜKEX 2011: The simulated cyberattack

The complaints of the IT experts: Sleepless in the IT industry

The complaints of the IT experts: Sleepless in the IT industry

Software Guide: This is how you better combat hacker attacks

Software Guide: This is how you better combat hacker attacks

Top Ten List: The Most Popular Desktop Firewalls

Top Ten List: The Most Popular Desktop Firewalls

Test, images, tips and data: G Data InternetSecurity 2011 - All information about the Security Suite

Test, images, tips and data: G Data InternetSecurity 2011 - All information about the Security Suite

UAC, BitLocker, AppLocker: Take advantage of the new security features of Windows 7

UAC, BitLocker, AppLocker: Take advantage of the new security features of Windows 7

Security Guide: The 10 Worst Virus Traps

Security Guide: The 10 Worst Virus Traps

Phishing, Credit Cards, Bots: That's how much Internet cheaters earn

Phishing, Credit Cards, Bots: That's how much Internet cheaters earn

Security Guide: How To Protect Against Internet Internet Risks

Security Guide: How To Protect Against Internet Internet Risks

Xing Group CW Reader: Cloud - it's not just about cost!

Xing Group CW Reader: Cloud - it's not just about cost!

Ponemon study: every second German company suffers from data theft

Ponemon study: every second German company suffers from data theft

Cyber ​​criminals on Facebook: Sex and the City as bait for social networks

Cyber ​​criminals on Facebook: Sex and the City as bait for social networks

CW Cloud Computing Survey: Users distrust Amazon and Google

CW Cloud Computing Survey: Users distrust Amazon and Google