From 2023, it will be mandatory for companies, authorities and organizations with 50 or more employees to create a whistleblower protection system. Learn what needs to be considered and how OTRS can support you.
ISO 27001 certification signifies that a company or organization has established an ISMS that is in line with the international standard. Learn what you need to look out for and how to find the right ISMS solution to support certification efforts.
Networking, whether in the smart home or Industry 4.0, brings many advantages. But it also provides more opportunity for cyber attacks. Here is an overview.
Automated security processes are more important today than ever before. Fast response times can avoid damage and high fines. Get informed now.
Does your company have the capabilities to recover as quickly as possible in the event of a cyber attack? Read why your company should be brought back to normal as quickly as possible and damage from cyber attacks should be kept to a minimum.
Finding the right cyber security tool is not always easy. We have prepared a selection of tools and explain the differences.
How does an incident management process work? What has to be considered in case of an incident? And how can STORM help?
To what extent does the corona virus endanger IT security, and what should one pay attention to in order to counteract risks?
The fear that hackers have an easier job while the majority of office workers work in the home office has, unfortunately, been confirmed.
We talked to our internal experts to find out what are their influential technology topics for 2020.
Defined processes have the biggest impact on being able to react swiftly to incidents in incident management.
Infrastructure security is a critical concern that requires coordinated attention by governments, businesses and individuals.
If you're considering a cloud-based option for your business, take time to ask your provider the following 12 questions to keep your data safe.