
adesso Blog
26.02.2025 By Alexander Böhm
Passkeys: The future of login – secure, user-friendly and efficient
Passwords are so yesterday! Insecure logins, forgotten passwords and phishing attacks are a major problem for companies. Passkeys offer a secure, user-friendly and phishing-proof alternative that is already supported by several large technology companies. Find out how Passkeys work and how adesso is helping to introduce this technology!
Read more05.12.2024 By Edin Mujezinovic
Efficient IT security with Microsoft Managed Security Services
IT security is complex, there is a shortage of skilled workers and the threats are increasing. How can companies protect their data and conserve resources at the same time? In my blog post, I explain how you can relieve the burden on your team, ensure 24/7 protection and dynamically adapt security strategies to new challenges with Microsoft Managed Security Services from adesso.
Read more28.03.2024 By Oliver Kling
What remains when the secure development process works?
This blog post discusses the security risk of consistently implementing a secure software development process.
Read more10.01.2024 By Oliver Kling
IT security: how can I deal with hundreds of security requirements?
In my blog post, I discuss two approaches to dealing with IT security requirements: traditional requirements engineering for end-to-end documentation and an iterative approach that speeds up IT security integration by carrying out risk assessments early on in the process. Addressing the requirements in an early phase and continuous improvement are prioritised over full and immediate integration. Using suitable tools and continuous monitoring minimise the risks prior to implementation.
Read more05.09.2023 By Oliver Kling
Security professionals and the brain surgeon paradox
What does brain surgery have to do with IT and application security? At first glance, not much. Nevertheless, I would like to look into this comparison in my blog post, because it strongly illustrates the importance of expertise and experience in complex areas.
Read more28.08.2023 By Domenic See and Tobias Dieter
Cyber kill chain
The cyber kill chain framework was developed for use in analysing and defending against cyber attacks. The framework consists of a series of seven steps that describe the typical phases of a cyber attack. I will explain the steps involved and the advantages of this strategy to defend against cyber attacks in more detail in my blog post.
Read more13.04.2022 By Tobias Dieter
Incredible gold finds in Germany! Use this simple hack to become an owner of precious metal.
Well, did I get your attention? Would you have clicked a big button saying ‘read more here’ if it had been placed under this headline? In my blog post, you’ll learn more about some of the methods that are used to digitally manipulate millions of people every day. I’ll explain to you the risks hidden behind these kinds of messages, what’s meant by the terms ‘clickbaiting’ and ‘hoax’ and how you can expose falsehoods and increase your awareness.
Read more26.07.2021 By Philipp Latini
User accounts and inactive access permissions
Digitalisation and cross-hospital and cross-network working are of utmost importance in the hospital world. Above all, it is essential to comply with the requirements of the General Data Protection Regulation (GDPR). In this blog post, we explain how this can be achieved and describe the solutions we offer to support hospitals.
Read more10.02.2021 By Arman Kohli
Measuring performance against (or just through) security costs
In IT, IT service management (ITSM) is mainly concerned with optimising the quality of IT services. Practice has shown that optimising security management is often more effective at improving information security in the longer term than investing in security technology is. As the focus on ITSM has increased in the IT environment, I’m going to use this blog post to explain how performance measurement and security costs are related in this context.
Read more