Proactively meeting the requirements of the NIS2 directive

P049281 427290

The second version of the Network and Information Security Directive (NIS 2) came into force in the EU at the beginning of 2023. The EU member states must transpose NIS 2 into national law by 17 October 2024. In Germany, the Federal Ministry of the Interior has already submitted a draft bill for an NIS2 […]

Trends and developments in the cyber security landscape

TEN IM Ausblick 2024

Although the new year is already a few days old, annual kick-off events are still in full swing everywhere. So we too have been thinking about what to expect in terms of information and IT security in 2024. Based on current trends and developments in the cyber security landscape, we anticipate the following challenges: Organisations […]

ISO 27001 Outlook 2024

ten im ausblick iso27001

Conversion to the latest version of the standard Companies that are certified according to the international standard ISO 27001 will have to think about converting their ISMS to the latest version of the standard in 2024. Now that the final version of the German translation will finally be available in January 2024, all German-speaking standard […]

Employees pose a greater threat to IT security than hackers

ten im kapsersky phishing

In the past two years, more than a third (37 per cent) of all cyber security incidents in Germany were due to employee misconduct. Hackers were only responsible for around 27 per cent of cyber security incidents. Security incidents were often related to negligence, but 30 per cent were due to phishing attacks. 15 per […]

ISC2 Secure Congress – Security of AI increasingly important

TEN IM ISC2 Secure Congress

Cybersecurity experts from around the world gathered in Nashville, Tennessee from 25-27 October for this year’s ISC2 Secure Congress. It became clear that the information and IT security community cannot ignore the topic of Artificial Intelligence, so this year’s focus was clearly on the security of AI. Machine learning and generative AI security Several presentations […]

Cloud security myth

TEN IM Mythos Cloud

Cloud security myth busted: Common misconceptions about security ownership in the cloud In recent years, cloud technology has become one of the most important and widely used IT infrastructures. Organisations of all sizes are taking advantage of the cloud to store data, host applications and streamline business processes. However, despite the growing popularity of the […]

AI phone fraud

pexels hassan ouajbir 804065

A few months ago, BR reported on attacks that work very similarly to the analogue “grandson trick”. Attackers pretend to be a close family member, claiming to be in an emergency situation – and in need of money. In reality, they are fraudsters. The aim is as clear as it is obvious: to get money […]

Lack of security awareness in German companies

KESB.jpg 05246064

“37.0 percent of companies in Germany do not regularly train their employees on topics such as spam or phishing. (…) Only every third company (35.5 percent) has a patch management policy. Yet security gaps in applications and operating systems are among the most common attack vectors in companies. Frightening figures can be found in the […]

Wazuh – Leading SIEM Platform

TEN IM Wazuh

How does the technology behind Watchdog by TEN IM actually work? Answer: we use Wazuh, one of the leading SIEM platforms on the market. Wazuh is an open source security platform designed to help companies monitor and secure their IT infrastructure. It combines powerful intrusion detection, log and vulnerability management and security analytics capabilities into […]