Blog

News about information & data security, as well as about TEN Information Management GmbH

How does the technology behind Watchdog by TEN IM actually work? Answer: we use Wazuh, one of the leading SIEM platforms on the market. Wazuh is an open source security platform designed to help companies...
Detect threats with a SIEM system A security information and event management (SIEM) system is a powerful solution that helps organisations detect, monitor and respond to threats to their information security. It enables the centralised...
Cost-effective solution for medium-sized businesses Watchdog by TEN IM is our managed SIEM (Security Incident & Event Management) solution that makes automated detection of attacks and vulnerabilities accessible to SMEs. We are often asked: how...
In discussions with customers and interested parties, we are repeatedly confronted with the statement that security investigations (penetration tests and vulnerability scans) are not necessary in cloud scenarios because the cloud provider (e.g. Amazon Web...
What is actually the difference between a Vulnerability Scan and a Penetration Test? There seem to be interesting misconceptions about this, as we would like to show with the following practical example.
ISO 27001 – Management of technical vulnerabilities The newly published ISO 27001:2022 in October 2022 brings a restructured catalogue of measures. Among other things, the new measure A.8.8 – Management of technical vulnerabilities – was...
Efficient protection through 2-factor authentication Multi-factor authentication (MFA) or mostly 2-factor authentication is on everyone’s lips. You read a lot about the benefits – and yet you are often annoyed when “the second factor” has...
Instant 27001, the simple and pragmatic documentation system for information security management systems (ISMS) according to the international standard ISO 27001, is now also available for Microsoft 365 in addition to Atlassian Confluence. Seamless integration...
“The cloud is another name for “someone else’s computer,” and you need to understand how much or how little you trust that computer.” (Bruce Schneier). The quote comes from the context of the LastPass breach...
Every company that uses Microsoft technologies is familiar with this: its own Windows environment is constantly growing, numerous settings are changed in the Active Directory every day, objects are created and deleted again. What about...