Magazine

A collection of articles that examine various topics in detail.
social engineering
IT security
What actually is social engineering?
From a seemingly harmless text message to a sophisticated phishing campaign—how attackers exploit employees' weaknesses and trust to achieve their goals.
Read more
Red Teaming 32 1
IT security
What is Red Teaming and for whom is it useful?
In this article, we explain the advantages of red teaming and show you which companies this special form of pentesting is suitable for.
Read more
WEAKNESS ANALYSIS32
IT security
Why should vulnerability analysis also be an issue for SMEs?
More than half of all SMEs in Germany have already been victims of a cyberattack, with financial losses running into the millions depending on the extent of the attack.
Read more
phishing 32
IT security
What actually is phishing?
A good phishing email can look deceptively genuine at first glance. If an attacker succeeds in deceiving the victim, depending on the target of the attack, they may gain access to company information or login details.
Read more
A container port with superimposed information on various container ships and containers
Digitization
What is a digital twin?
In the course of Industry 4.0, the digital twin is becoming increasingly important. But what possibilities does the use of the digital twin offer?
Read more
A surveillance camera mounted on a wall
IT security
What type of pentest do I need?
A pentest must be carried out with the right objectives and the right scenarios if it is to be profitable.
Read more
The logo for ExANT
Digitization
ExANT
Consortium from Germany uses AI to convert technical text into a form that computers can understand.
Read more
The word security on a monitor
IT security
Cyber security for SMEs
Correctly assess and analyze the cyber security risk - we show you what options are available.
Read more
A bookshelf with lots of old books
Software
Dependencies in software development
Make-or-buy? Decisions to use frameworks or third-party software often lead to discussions about the sensible use of time and money.
Read more
A light bulb
Cloud
Our foray into the cloud
The transition to the cloud was yesterday, today we are ready for the work of tomorrow.
Read more
An image of the earth from space
Digitization
What do CIOs and astronauts have in common?
Not much at first glance, but both have a unique view of their cosmos.
Read more
A man looks up at six white light bulbs against a black background
Digitization
The agile mindset - makes sense?
An agile mindset can help on the path to agile transformation. However, the term alone does not help. So what can you do to achieve an agile mindset?
Read more
Software code
Software
Remote pair programming in times of Corona
How can remote pair programming be implemented in times of COVID-19 when all employees are working remotely? Our experience so far shows that it works very well!
Read more

Does that sound interesting for you and your company?

Then get in touch with us.