The EnBITCon Blog
SonicOS 7 – Wie Firewalls echte Business-Enabler werden
Moderne Firewalls sind weit mehr als Schutzmechanismen. In vielen Unternehmen übernehmen sie heute zentrale Rollen im...
Wi-Fi Backscatter: What’s behind it — and how to realistically assess the risk
“I’m not even connected to the Wi-Fi…” — that’s no longer something you can rely on. With Wi-Fi backscatter, it is th...
QRishing (Quishing): When QR Codes Become a Phishing Trap
QR codes are everywhere: on parcels, parking meters, posters, invoices, access cards. That’s exactly what makes them...
Data Mesh vs. Data Lake – Which approach is right for you?
Companies collect more data than ever—but the real value only emerges when teams can work with it quickly, reliably...
Fail Friday: Screen Sharing & Personal Hotspot — Common Mistakes and Quick Fixes
Welcome to our Fail-Friday! Every second Friday of the month, we share anonymized little mishaps from everyday IT lif...