People sitting at a table

adesso BLOG

Tags:

  • IT-Security

Show all posts
Methodology

Passwords are so yesterday! Insecure logins, forgotten passwords and phishing attacks are a major problem for companies. Passkeys offer a secure, user-friendly and phishing-proof alternative that is already supported by several large technology companies. Find out how Passkeys work and how adesso is helping to introduce this technology!

Read more
Methodology

IT security is complex, there is a shortage of skilled workers and the threats are increasing. How can companies protect their data and conserve resources at the same time? In my blog post, I explain how you can relieve the burden on your team, ensure 24/7 protection and dynamically adapt security strategies to new challenges with Microsoft Managed Security Services from adesso.

Read more
Inside adesso

In my blog post, I discuss two approaches to dealing with IT security requirements: traditional requirements engineering for end-to-end documentation and an iterative approach that speeds up IT security integration by carrying out risk assessments early on in the process. Addressing the requirements in an early phase and continuous improvement are prioritised over full and immediate integration. Using suitable tools and continuous monitoring minimise the risks prior to implementation.

Read more
Inside adesso

Well, did I get your attention? Would you have clicked a big button saying ‘read more here’ if it had been placed under this headline? In my blog post, you’ll learn more about some of the methods that are used to digitally manipulate millions of people every day. I’ll explain to you the risks hidden behind these kinds of messages, what’s meant by the terms ‘clickbaiting’ and ‘hoax’ and how you can expose falsehoods and increase your awareness.

Read more