People sitting at a table

adesso BLOG

Tags:

  • IT-Security

Show all posts
Methodology

A modern workplace is essential for flexibility and the rapid integration of new technologies, but it also harbours security risks. An effective security strategy must be flexible and quickly adaptable in order to integrate new technologies and ensure data and access security. I explain what this looks like and what needs to be done in my blog post.

Read more
Inside adesso

In my blog post, I discuss two approaches to dealing with IT security requirements: traditional requirements engineering for end-to-end documentation and an iterative approach that speeds up IT security integration by carrying out risk assessments early on in the process. Addressing the requirements in an early phase and continuous improvement are prioritised over full and immediate integration. Using suitable tools and continuous monitoring minimise the risks prior to implementation.

Read more
Inside adesso

Well, did I get your attention? Would you have clicked a big button saying ‘read more here’ if it had been placed under this headline? In my blog post, you’ll learn more about some of the methods that are used to digitally manipulate millions of people every day. I’ll explain to you the risks hidden behind these kinds of messages, what’s meant by the terms ‘clickbaiting’ and ‘hoax’ and how you can expose falsehoods and increase your awareness.

Read more

Save this page. Remove this page.