Now free initial consultation by mail or phone: +49 228 - 33 88 89 0

The EnBITCon Blog

Financial fraud with liquidity mining - Current scam in crypto hype picks up speed

Published on 20 May 2022 Sophos   Liquidity Mining, Betrug, Kryptowährung

Threat Hunting: Five steps for successful hunting

With threat hunting and an effective contingency plan, you can increase security for your company.
Published on 13 May 2022 Sophos   Cybersecurity, Cyber Threat, Cyberangriffe

A true converged platform starts with a powerful network firewall

Nowadays it is difficult to make security appliances compatible with today's modern network.
Published on 6 May 2022 Fortinet   Fortinet, Firewall, fortigate

Microsoft Azure Peering Service - What does a fast lane have to do with information security?

Many large companies use Microsoft Azure services. These include the best-known Azure application Office 365 with ser...
Published on 29 April 2022 In eigener Sache

Greenbone extends compliance guidelines for CIS benchmarks

Greenbone 2022 continues to build out the policies contained in the Greenbone Enterprise Feed.
Published on 25 April 2022 Greenbone   Cybersecurity, Update, Richtlinien