Misconfigurations in the cloud What is misconfiguration, how does it happen and how can we avoid it? ... July 2023
Penetration Testing - A simulated cyber attack We find out how penetration tests work, what advantages they offer and what role they play for security in companies.... June 2023
The world of hackers What hackers are there? What is their motivation? And how do hackers affect the security of web applications and data?... June 2023
OWASP - Vulnerabilities in Web Applications Find out what security risks there are in web applications, which ones occur most frequently and what OWASP has to do with it.... June 2023
DevSecOps - How security comes into software development Cybersecurity is becoming increasingly important, also in the DevOps area. We show you best practices for the introduction of DevSecOps.... June 2023