You are here:
Page 3 of 12
Thinking about moving your infrastructure to the cloud? We have taken the step and discuss the pros and cons in our first podcast.
TELE TOP focused on cyber attacks and shows how important this topic is in particular for small companies
Stephan Sekula identified a XSS vulnerability in Canopy.
Cybercrime is one of the greatest threats of our time and it does not stop at public administrations. How are the cities and municipalities dealing…
Adrian Kress identified a XSS vulnerability in the audit management system TeamMate+.
Philipp Mao identified a vulnerability in VeridiumAD.
Stephan Sekula identified a XSS vulnerability in the frontend of Storyblok.
Philipp Mao identified a vulnerability in the Windows Logon Agent of Thales SafeNet.
Agile software development models are being used in many companies and have numerous advantages over classic development processes. Cyrill…
Emanuel Duss identified a security vulnerability in the Ionic Identity Vault secure storage solution on Android and iOS.
Fabio Poloni identified a vulnerability in the Cisco Firepower Management Center.
The Fachvereinigung Krankenhaustechnik E.V. recently invited its members to a webinar on the topic of «Cyber Attacks on Hospitals and Medical…
Authentication and authorization are critical components of any application. Various standards and frameworks have been developed to facilitate the…
Young professionals, industry and business network at Career Day "Engineering & Computer Science".