IT Security Blog

Blog posts about IT security in general, penetration testing, cloud security and red teaming from our team.
Pentest vs. Red Team Assessment
Pentest vs. Red Team Assessment

A comparison of the terms pentest and red team assessment and the business challenges of IT security assessments.

Read More
How much does it cost to crack your Password
How much does it cost to crack your Password

It is important to know what monetary effort is required to crack a password and how it should be chosen simply and securely.

Read More
Why you should change the penetration tester
Why you should change the penetration tester

Most managers consider switching providers for penetration testing as best practice.

Read More
Agile Methods in Web Security
Agile Methods in Web Security

Agile security scans are essential to meet the required IT protection goals in modern development environments. This process is directly integrated into the CI/CD pipeline.

Read More
Budgeting in Web Application Security
Budgeting in Web Application Security

IT security can never be perfect, therefore a cost-efficient approach to an optimum must take place.

Read More
DevOps Security in Web Development
DevOps Security in Web Development

DevOps Security means that in modern development environments, security processes are not only selectively but firmly integrated into the software development.

Read More
Ticket as a digital Asset on a public Blockchain
Ticket as a digital Asset on a public Blockchain

Digital assets are goods or rights that people can buy or earn in digital form. Tickets can be displayed as such immaterial value.

Read More