Rezultati pretraživanja
  1. 1. velj

    6 months' research, endless coffee and sleepless nights – that's what the CPU security vulnerability research was like when our analyst discovered it. He tells us more about it in our !

  2. 14. ruj 2019.
  3. 13. lis 2019.

    These days, cyber supply chain risk management is a MUST. Find out how to efficiently build a C-SCRM to minimise threats in our !

  4. 22. lis 2019.

    SAP provides an overview of the entire company, not just to you but also to hackers, with potentially disastrous consequences. Find out in our the dangers that are currently lurking in SAP and how to protect yourself!

  5. 28. lis 2019.

    Are ERP systems a gateway for hackers to manipulate pipelines? It's not science fiction, it's reality! Our tells you what cyber risks companies are facing with ERP systems.

  6. 5. pro 2019.

    The world of cyber security is developing in a more dynamic way than ever before. Find out the trends our partner Sophos is forecasting for 2020 in our - including a report to download!

  7. 30. stu 2019.

    Do you use Office 365? Its benefits speak for themselves, but there is a lot to take into consideration when it comes to security. In our you can find out how you can optimise O365's security!

  8. 29. lis 2019.

    Have you always wanted to get an insight into the world of a professional hockey player? In this interview, "our" of the gives us some exclusive insights and reveals the secret of his success.

  9. 27. stu 2019.

    New article! To learn more about the strengths and challenges, as well as solutions and suggestions for hardware security, please visit our blog:

  10. 15. sij

    Our computer science apprentices Kai and Andrin give an insight into their training to be future experts and the day-to-day work at . Interested? In the now!

  11. 7. lis 2019.

    How to be aware of attacks. Read our blog: Call us if you're a victim of ransomware attack: +971 4 2415888 or +971 50 8865252

  12. 21. sij

    A CISO is a key person in Cyber Security - also in stormy times! In our , find out the jobs CISOs have to perform during a security incident!

  13. 16. sij

    NEW BLOG POST! Security expert, Prof. Albert Jeng, puts forth the idea that blockchain isn't the "cure-all" for security solutions and weighs it's pros & cons.

  14. 7. kol 2019.

    Here are some of the frequently asked questions regarding the exam which might help you if you are planning to take this certification test soon.

  15. 6. kol 2019.

    Anyone who belongs to the world of cybersecurity or understands it well cannot deny the immense career growth in the future in this field.

  16. 31. sij

    🚦 TECHNICAL INSIGHTS: Are ready to lawfully intercept TLS 1.3? 💡 Some more nuggets of wisdom from our technical team for you! 👉

  17. 27. sij

    In 2018, billions of people were impacted by data breaches, nearly doubling in frequency from the previous year. But there are many ways that organizations can protect themselves against cyberattacks!

  18. 22. sij

    What are the security and privacy challenges when data resides in and emanates from our own bodies? But first, what is the Internet of Bodies? Find out here:

  19. 22. sij

    Bei einem Security Incident ist nicht nur das gefragt, sondern auch der CISO. Was seine Aufgaben in solch stürmischen Zeiten sind und wie er sich behaupten kann, erfahren Sie im !

  20. 15. sij

    At , what does the day-to-day life of an IT apprentice look like? Kai and Andrin are both in the fourth year of their apprenticeships and will give you an insight. In the now!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.