IT Security Blog by turingpoint

Blog posts about IT security in general, penetration testing, cloud security and red teaming from our team.

Where can you find out about Ethical Hacking?
Where can you find out about Ethical Hacking?
March 1, 2021New

Here you can find out what ethical hacking is and which podcasts you can use to learn about it.

More
Ransomware Emergency: These Ttips will help you
Ransomware Emergency: These Ttips will help you
February 4, 2021

Once there is a suspicion of ransomware, it is usually already too late. Therefore, we inform you how to act in such a situation.

More
Red Teaming: Objectives and Methods
Red Teaming: Objectives and Methods
February 3, 2021

The primary goal of Red Teaming is to find potential vulnerabilities in network and server security but also in employee behavior.

More
HSTS: What you should know about the HTTPS extension
HSTS: What you should know about the HTTPS extension
February 1, 2021

In our article, we look at the technical background of HSTS, HTTPS and SSL stripping. Learn more about website security now.

More
What is Phishing? These are the Facts You should know in 2021
What is Phishing? These are the Facts You should know in 2021
January 24, 2021

In our article, we show you which IT measures you can take to protect yourself from phishing and cyber attacks. Learn more now.

More
What offers Protection against Social Engineering?
What offers Protection against Social Engineering?
January 20, 2021

The term social engineering describes the targeted manipulation of people. The aim is to gain access to confidential information.

More
Maturity Analysis of the IT Security Organization
Maturity Analysis of the IT Security Organization
October 4, 2020

Every IT security organization should evaluate at which stage the measures already taken are in order to avoid redundant security analyses.

More