March 23, 2022+00:00>
Automatically detect orphaned user accounts
The things that turn out to be security-relevant in today’s IT world amaze many. Because …
Read More
March 23, 2022+00:00>
The things that turn out to be security-relevant in today’s IT world amaze many. Because …
Read More
February 21, 2022+00:00>
Let’s face it. Who among us has never written a password on a piece of …
Read More
August 3, 2021+00:00>
A modern IT system allows us to set all possible security measures in a finely …
Read More
July 12, 2021+00:00>
“PrintNightmare”, what is it actually? The Windows 10 exploit known as “PrintNightmare” is currently on …
Read More
March 19, 2021+00:00>
Back then… Can you still remember the telephone number databases on CD? With which we …
Read More
November 26, 2020+00:00>
A colourful world with weak points Threats in the IT sector have existed since IT …
Read More
November 12, 2019+00:00>
According to Dell Technologies’ Global Data Protection Index, around 80% of German companies faced major …
Read More
November 4, 2019+00:00>
The cloud is totally in vogue. No matter where you look in the IT industry, …
Read More
July 12, 2019+00:00>
The other day at an appointment: The customer and I look at Docusnap’s authorization analysis …
Read More
February 20, 2015+00:00>
In the third part of this blog post, I will continue describing individual safeguards in …
Read More