According to the 2018 Global Risk Report the World Economic Forum released this year, Cyberattacks are amongst the Top 5 Risks for Global Stability in terms of Likelihood and Impact. A data breach caused by a cyber attack can indeed have an incredible impact on any country, corporation or business owner.
The world of IT security can get confusing with all the different vulnerabilities, exploits and newly emerging trends. In this article we summarise and shortly explain the top 6 most important web vulnerabilities that managers need to be aware of and tackle on a constant basis.
The concept of DevOps and agility is nothing new for most companies and developers circling the sun. The most well known frameworks (e.g. Scrum, XP etc.) are applied in many development teams and lead to a number of benefits for teams, companies and customers. Evidence shows that agile methods cause better performances in comparison to the outdated waterfall method. For many companies the outdated waterfall method is the largest contributor to project failure. Another problem with traditional step-by-step programming is that products do not exactly meet the demand of customers and need to be redesigned which takes time and costs money. Through DevOps, development teams work closely with the customer and need to adjust fewer things at the end of the project.
The times when hacking attacks were unusual and only happened to big companies are over. Hacking private people and small or medium-sized companies has become a lucrative environment for many people with sufficient IT knowledge. That is why hacking is an issue facing almost everybody in the modern world. Often companies recognize the problem when it’s already too late and valuable data (or even money) is lost. I’d like to show you how you can detect that your website has been hacked and what you can do to prevent such vulnerabilities.
“The first CEBIT of a new era” as Oliver Frese (Member of the Board of Deutsche Messe AG) called it. A pretty bold statement in advance of one of the biggest IT trade fairs.
Did the CEBIT hold up to that promise? What did we learn this year? Our takeaways from this year’s CEBIT!
Why blocking ads and enforcing https is a good thing
Overall you and l are painfully aware of cyber security threats however business implications are sometimes a bit blurry and that’s why I’d like to address the business impact of the Spectre and Meltdown attack in a bit more detail from the business point of view.