Cloud security myth

TEN IM Mythos Cloud

Cloud security myth busted: Common misconceptions about security ownership in the cloud In recent years, cloud technology has become one of the most important and widely used IT infrastructures. Organisations of all sizes are taking advantage of the cloud to store data, host applications and streamline business processes. However, despite the growing popularity of the […]

AI phone fraud

pexels hassan ouajbir 804065

A few months ago, BR reported on attacks that work very similarly to the analogue “grandson trick”. Attackers pretend to be a close family member, claiming to be in an emergency situation – and in need of money. In reality, they are fraudsters. The aim is as clear as it is obvious: to get money […]

Lack of security awareness in German companies

KESB.jpg 05246064

“37.0 percent of companies in Germany do not regularly train their employees on topics such as spam or phishing. (…) Only every third company (35.5 percent) has a patch management policy. Yet security gaps in applications and operating systems are among the most common attack vectors in companies. Frightening figures can be found in the […]

Wazuh – Leading SIEM Platform

TEN IM Wazuh

How does the technology behind Watchdog by TEN IM actually work? Answer: we use Wazuh, one of the leading SIEM platforms on the market. Wazuh is an open source security platform designed to help companies monitor and secure their IT infrastructure. It combines powerful intrusion detection, log and vulnerability management and security analytics capabilities into […]