blog phone

adesso BLOG

5

Tags:

  • Cyberattacs

Show all posts
Methodology

28.08.2023 By Domenic See and Tobias Dieter

Cyber kill chain

Picture

The cyber kill chain framework was developed for use in analysing and defending against cyber attacks. The framework consists of a series of seven steps that describe the typical phases of a cyber attack. I will explain the steps involved and the advantages of this strategy to defend against cyber attacks in more detail in my blog post.

Read more
Inside adesso

Well, did I get your attention? Would you have clicked a big button saying ‘read more here’ if it had been placed under this headline? In my blog post, you’ll learn more about some of the methods that are used to digitally manipulate millions of people every day. I’ll explain to you the risks hidden behind these kinds of messages, what’s meant by the terms ‘clickbaiting’ and ‘hoax’ and how you can expose falsehoods and increase your awareness.

Read more
Inside adesso

Cyber criminals are changing their tactics and following us into our offices at home. This also increases the cyber risks posed to our companies. Offices at home can therefore become a gateway for new forms of data theft. Are we now helplessly and capriciously exposed to this data theft?

Read more
Methodology

In IT, IT service management (ITSM) is mainly concerned with optimising the quality of IT services. Practice has shown that optimising security management is often more effective at improving information security in the longer term than investing in security technology is. As the focus on ITSM has increased in the IT environment, I’m going to use this blog post to explain how performance measurement and security costs are related in this context.

Read more
Inside adesso

The security of IT services is always changing Continuously developing an information security management system (ISMS) based on existing standards and tailored adjustments can lead to the information being used securely in the long term. That’s why in this blog post, I explain what’s behind each of the standards in the ISO 2700x series and put them to the test.

Read more