IT Security Blog

Blog posts about IT security in general, penetration testing, cloud security and red teaming from our team.
Maturity Analysis of the IT Security Organization
Maturity Analysis of the IT Security Organization

Every IT security organization should evaluate at which stage the measures already taken are in order to avoid redundant security analyses.

Read More
Cross Site Scripting - Overview, Definition and Case Studies
Cross Site Scripting - Overview, Definition and Case Studies

XSS vulnerabilities are more and more often found in single page web applications (SPA) as part of a penetration test, because a lot of business logic in the form of Java Script (JS) is moved to the front end.

Read More
Cost and Pricing for a Pentest
Cost and Pricing for a Pentest

How much costs should be considered for a pentest? The response depends on several factors, including the complexity of the organization to be evaluated.

Read More
Pentest vs. Red Team Assessment
Pentest vs. Red Team Assessment

A comparison of the terms pentest and red team assessment and the business challenges of IT security assessments.

Read More
How much does it cost to crack your Password
How much does it cost to crack your Password

It is important to know what monetary effort is required to crack a password and how it should be chosen simply and securely.

Read More
Why you should change the penetration tester
Why you should change the penetration tester

Most managers consider switching providers for penetration testing as best practice.

Read More
Agile Methods in Web Security
Agile Methods in Web Security

Agile security scans are to meet the required IT protection goals in development environments. This process is directly integrated into the CI/CD pipeline.

Read More
Budgeting in Web Application Security
Budgeting in Web Application Security

IT security can never be perfect, therefore a cost-efficient approach to an optimum must take place.

Read More
DevOps Security in Web Development
DevOps Security in Web Development

DevOps Security means that in modern development environments, security processes are not only selectively but firmly integrated into the software development.

Read More
Ticket as a digital Asset on a public Blockchain
Ticket as a digital Asset on a public Blockchain

Digital assets are goods or rights that people can buy or earn in digital form. Tickets can be displayed as such immaterial value.

Read More