IT Security Blog

Blog posts about IT security in general, penetration testing, cloud security and red teaming from our team.
What offers Protection against Social Engineering?
What offers Protection against Social Engineering?
20.01.2021Latest

The term social engineering describes the targeted manipulation of people. The aim is to gain access to confidential information.

Read More
Page 1
What is a Sandbox in IT Security?
What is a Sandbox in IT Security?
19.01.2021

In this world of IT advancements, cyber security is extremely important and the usage of the Sandbox can ensure the effective protection.

Read More
Maturity Analysis of the IT Security Organization
Maturity Analysis of the IT Security Organization
10/04/2020

Every IT security organization should evaluate at which stage the measures already taken are in order to avoid redundant security analyses.

Read More
XSS - Overview, Definition and Case Studies
XSS - Overview, Definition and Case Studies
09/01/2020

XSS vulnerabilities are found during penetration tests in single-page web applications, as there is a lot of business logic through JavaScript in the front end.

Read More
Cost and Pricing for a Pentest
Cost and Pricing for a Pentest
08/11/2020

How much costs should be considered for a pentest? The response depends on several factors, including the complexity of the organization to be evaluated.

Read More
Pentest vs. Red Team Assessment
Pentest vs. Red Team Assessment
03/24/2020

A comparison of the terms pentest and red team assessment and the business challenges of IT security assessments.

Read More
How much does it cost to crack your Password
How much does it cost to crack your Password
02/13/2020

It is important to know what monetary effort is required to crack a password and how it should be chosen simply and securely.

Read More