Mid-Market Identity Sprawl: What Three Common AD-Plus-Cloud Setups Reveal About Real Attack Surfaces
AD with Entra ID sync, hybrid hyperscaler roles, fragmented IdP landscape: Three setups reveal where documentation and reality diverge. Read article
Real-world security projects in action. See how hospitals fend off ransomware, how industrial manufacturers secure OT networks, and how insurers deploy AI-driven fraud detection. Learn from concrete implementations, past mistakes, and measurable outcomes across German and European enterprises.
AD with Entra ID sync, hybrid hyperscaler roles, fragmented IdP landscape: Three setups reveal where documentation and reality diverge. Read article
BSI, data protection authorities, and insurers expect parallel reports with individual deadlines in 2026. What the NIS2 initial report requires—and where reporting runs into problems. Read article
Three anonymized examples from twelve months of post-mortems: what truly gets restructured in production after a ransomware incident. Read article
A medium-sized machinery manufacturer with 1,200 employees fell victim to a cyber attack on its OT network in February 2026. Thanks to prepared recovery processes and a segmented network architecture,... Read article
7 min Reading Time 3,600 financial institutions in Germany now operate under a new regulation with no grace period: the Digital Operational Resilience Act (DORA). In force since January 17,... Read article
1 min Reading Time DORA has been fully applicable since January 17, 2025. After the first few months, it is clear: The technical requirements for ICT risk management, testing, and... Read article
A maximum care hospital became the target of a cyberattack. The attackers compromised the administrative network but failed due to the segmentation of medical technology. Hospital operations continued uninterrupted. TL;DR... Read article
1 min Reading Time A utility company with 900 employees achieved NIS2 readiness in 6 months — with a limited budget and without external consulting firms. The key: consistent use... Read article
A financial services provider has migrated its core applications to the Azure Cloud – with security as an integral part from day one. Result: DORA compliance maintained, operating costs reduced... Read article
An insurance corporation with 8,000 employees migrated its network architecture to Zero Trust in 18 months. The results: 73% fewer VPN support tickets and a measurably reduced attack surface. TL;DR... Read article
An automotive supplier became the target of a targeted spear-phishing campaign. The attackers imitated a real supplier – thanks to security awareness training, 94% of recipients recognized the attack. TL;DR... Read article
A machinery manufacturing company discovered during a routine compromise assessment with THOR that attackers had been active in their network undetected for 9 months. The case shows: EDR alone is... Read article
A regional energy supplier became the target of a ransomware attack. Thanks to prepared network segmentation and a tested incident response plan, the spread was stopped within 4 hours. TL;DR... Read article
Over 50 web projects – each post-launch audit found vulnerabilities. Open admin accesses, forgotten staging servers, standard passwords. A relaunch without a security check is like playing Russian roulette. TL;DR... Read article
NIS2 may seem complex, but it can be broken down into five structured steps. This guide is aimed at IT managers and CISOs in SMEs who want to implement it... Read article
Data Protection Impact Assessment (DSFA) is a somewhat cumbersome term. However, what the GDPR essentially describes is sensible and necessary: it is about assessing and documenting the possible negative consequences... Read article
We tested WithSecure Elements for three months in a mid-sized IT environment with 180 endpoints. The result: fast deployment, strong EDR functions – but the documentation could be better. TL;DR... Read article
The NIS2 Directive expands cybersecurity obligations to over 30,000 German companies. While large corporations have long established compliance teams, SMEs face a triple challenge: unclear applicability, limited resources, and a... Read article
In an interview, a CISO of a German mid-sized company discusses a real ransomware attack and the first 48 hours that followed. His most important takeaway: Technical preparation alone is... Read article
Companies with nationwide branches in Germany need secure IT structures – and reliable redundancy systems when the internet connection falters and stutters. So-called multi-carrier concepts excel precisely in this area.... Read article
The ransomware attack on Kaseya in July 2021 impacted over 1,500 companies worldwide – through a single software vulnerability. The incident reveals how vulnerable global supply chains are and why... Read article