Evolution of Protection Goals

Protection Goals: CIA and CIAA

Protection Goals: CIA and CIAA Management Summary The traditional protection goals of information security are confidentiality, integrity and availability. These three protection goals are often referred to as the CIA triad (owing to the initial letter of the respective goals). Meanwhile, another protection goal has gained in importance. First mentioned by the BSI as a[…]

Supervisory Requirements for IT in Insurance Companies (VAIT)

Supervisory Requirements for IT in Insurance Companies (VAIT) Management Summary The Federal Financial Supervisory Authority (BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht)) has formulated clear expectations for the management and organisation of the IT of insurance companies in the form of the Supervisory Requirements for IT in Insurance Companies (VAIT (Versicherungsaufsichtliche Anforderungen an die IT )). On the[…]

Direct Flash: The new generation of flash memory

Direct Flash: The new generation of flash memory Flash devices allow companies to provide fast storage on-premises. This can be particularly helpful for hybrid architectures. Processes that require low latency and high bandwidth are hosted locally using flash memory. Less demanding applications – including “cold” data sets – are migrated to the cloud. Pure Storage[…]

IT Budget for Cloud Computing

IT budget for Cloud Computing Anyone wishing to expand their IT infrastructure with cloud resources – be it in the form of a private, public or hybrid cloud – quickly realizes that this shift requires a re-orientation of the IT budget – especially the evaluation of cloud computing. Cloud services cost accounting follows different rules[…]

Azure File Sync

Azure File Sync Up to now, many hybrid cloud scenarios have been acceptable at best. With Azure File Sync, Microsoft presents what is a milestone and paves the way for File Services into the world of hybrid clouds. Reading time: 12 minutes. With File Sync, cloud storage does not play the role of a storage component[…]

Containers and Docker – What are they anyway?

Containers and Docker – What are they anyway? Starting with the development community, the terms Mircoservices, Containers and Dockers are spilling through the IT world. We try to provide an understandable, abstract overview for IT management. Reading time 10 minutes. When we speak of the three terms above, we find ourselves in the domain of[…]

10 Points Plan against Ransomware

10 Points Plan against Ransomware You have heard about Cryptolocker Infection over the news? In this article you can learn more about this type of malware and receive tips and suggestions on how to protect your company against Ransomware. Reading time 5 minutes. What is Ransomware? Over the past few years, we have witnessed the[…]

Cybersecurity Glossary

In an increasingly interconnected world where societies depend on digital infrastructure, cyber security is becoming increasingly relevant. The fact that data breaches are becoming increasingly frequent and hacker attacks on power suppliers are successful shows the impact that insufficient cyber security can cause. In this glossary you will find a condensed overview of the most[…]

The Cloud World Market Leaders

The Cloud World Market Leaders Cloud Services are ubiquitous, and two companies in particular were able to build a name for themselves: Microsoft Azure and Amazon Web Services. If you want to know how the two vendors differ and which one fits you best, this article will provide you with everything you need to know. Reading[…]

Roadmap Cloud

Roadmap Cloud Author: Carsten Reffgen The introduction of new technologies is always a challenge as much as a risk for IT executives. With cloud computing there are additional issues as cloud computing changes processes and the collaboration with other departments. In the following, we provide an overview and suggestions as to which subjects fall in[…]