From 2023, it will be mandatory for companies, authorities and organizations with 50 or more employees to create a whistleblower protection system. Learn what needs to be considered and how OTRS can support you.
ISO 27001 certification signifies that a company or organization has established an ISMS that is in line with the international standard. Learn what you need to look out for and how to find the right ISMS solution to support certification efforts.
Risk management software helps organize, manage and control a company's risk based on up-to-date data.
Risk management is an essential component of GRC alongside corporate governance. This is how you prepare your company for risks and recognize opportunities.
Grey market, product manufacturer, create it ourselves, or stick with what we do today . . . As you set technology priorities for the upcoming year, you will investigate products and services to improve workflows and offer more security.
Networking, whether in the smart home or Industry 4.0, brings many advantages. But it also provides more opportunity for cyber attacks. Here is an overview.
A step-by-step plan helps increase IT security in production. More than half of companies are not ideally prepared for an IT security incident.
Automated security processes are more important today than ever before. Fast response times can avoid damage and high fines. Get informed now.
Does your company have the capabilities to recover as quickly as possible in the event of a cyber attack? Read why your company should be brought back to normal as quickly as possible and damage from cyber attacks should be kept to a minimum.
Finding the right cyber security tool is not always easy. We have prepared a selection of tools and explain the differences.
Are vulnerabilities only limited to IT, or do they also have something to do with us? And when do we have to counter them and, above all, how?
The digitization of business is picking up speed. Find out why cyber security should not be neglected here.
How does an incident management process work? What has to be considered in case of an incident? And how can STORM help?
Tighter security measures apply to critical infrastructures. We provide recommendations for risk management.
Infrastructure security is a critical concern that requires coordinated attention by governments, businesses and individuals.