Cybersecurity

Feature "Digitalization"
Building Trust & Mitigating Abuse – Call for Contributions
dotmagazine’s Call for Contributions on how the digital society and digital economy of today and tomorrow can be protected so that it can thrive.

Feature "Quantum Computing"
Quantum Computing and the Future of Encryption
Quantum computing may still be some years from its breakthrough, but we should be preparing now for security in the post-quantum era

Feature "Cybersecurity"
A Day in the Life of a Cyber Policeman
What gives cyber policemen sleepless nights? Dirk Kunze talks about serious cyber crime and seriously terrifying cyber crime
Industry Insights "Cybersecurity"
Cyber Security in the EU

Feature "Company Security"
Building IT Defenses – Keeping the Wolves from the Company Gate
What’s your bottom line? Cyber attacks against companies range from the sophisticated to the ingeniously simple – and it could be your competitive advantage on the line.
Industry Insights "Company Security"
Cyber Crime Against Companies – There’s Money to be Made
Proactive Hunting for Hidden Threats using Metadata

Feature "E-Health"
Reigning in Toddler Technology – Making E-health Safe
E-health is still in its infancy – how can we ensure that the benefits are not outweighed by the risks to life, limb and privacy?
Industry Insights "E-Health"
Securing Intelligent Healthcare
Who Wants to Get Hold of Your Health Data?
Open and Secure Communication Platforms for Cooperation and Innovation
Ambient Assisted Living in the Zelia Project: Lessons Learned
Alternative Authentication Approach to Medical Devices
Hospitals in the Focus of Cyber Criminals

Feature "Cybersecurity"
IT Security: Don’t Try to Make the Impossible Possible
IT security is a major cause for concern for companies, and it is important to ensure a good level of security to protect against hacker attacks and industrial espionage. But should companies aim for perfect security? This is not sensible, Karsten Nohl from Security Research Labs tells dotmagazine.
Industry Insights "Cybersecurity"
Secure SD-WAN – Helping CIOs Meet their Goals
Prevention, Defense, and Detection: IT Security in Companies

Feature "DNS"
DNS Cookies: The Transaction Mechanism to Protect the Namespace
Although they are not the cure for all name server problems, DNS cookies offer an extra layer of protection and are particularly effective against off-path attacks. Simone Catania, InterNetX, looks at how DNS cookies can make DNS transactions more secure.

Feature "IoT"
The Internet of Things – Understanding IoT from a Security Perspective
Joseph Carson from Thycotic looks at IoT risk assessment and calls for a redefinition of IoT to achieve clarity from a security perspective.
Industry Insights "IoT"
Making the Internet of Things More Secure

Feature "Encryption"
Encryption – Balancing Needs for IT Security & Law Enforcement
Klaus Landefeld, eco Vice-Chair, looks at ways to enable access to digital evidence internationally, without dismantling security and trust on the Internet.

Feature "Company Security"
IT Security: People Still Don’t Seem to Realize that the Threats Affect Them
The eco Association has just published its annual IT security study. Oliver Dehning, CEO of HornetSecurity and Leader of the eco Competence Group Security, offers his perspective on the results.

Feature "DNS"
A Day in the Life of a Man with a Key to the Internet
dotmagazine’s Judith Ellis talks to Olaf Kolkman of the Internet Society about the Domain Name System and his key to the Internet.

Feature "Cybersecurity"
Fake Shops: Tips for Safe Xmas Shopping
Fake Internet sales platforms are popping up all over the place in December, the strongest month for online sales. Peter Meyer, Head of Cyber Security Services at eco, provides advice on how consumers can recognize fake shops and avoid the heartache of being ripped off this Christmas.
Industry Insights "Cybersecurity"
SIWECOS - Secure Websites and Content Management Systems

Feature "Company Security"
How Much of an IT Security Risk Are You to Your Company?
The best security is only as strong as its worst password and naivest user. Markus Schaffrin from the eco Association explains how important the behavior of staff and management is for company security.
Industry Insights "Company Security"
“Phishing” Your Staff to Raise Security Awareness

Feature "Cybersecurity"
Shouldering Responsibility for IT Security – A Multi-Stakeholder Approach
IT security is the mutual responsibility of all stakeholders, from civil society to industry and government, says Prof. Norbert Pohlmann
Industry Insights "Cybersecurity"
Improving the Security and Resilience of the Internet through MANRS

Feature "Cybersecurity"
Hand in Hand for Secure Websites – Making the Internet Safer
Open source CMS communities like TYPO3 are working with the eco Association to improve security for commercial and private websites, reports Markus Schaffrin from eco.
Industry Insights "Cybersecurity"
Women in Digital Ecosystems

Feature "DNS"
Next Steps in Combatting DNS Abuse
Thomas Rickert and Lars Steffen from the eco Association take stock and give an outlook on collaborating in the fight against abuse involving the DNS.

Feature "Company Security"
Why IT Security is Like Shopping for Christmas
There are three striking similarities between IT security and shopping for Christmas. Most of us have too much stuff to begin with. Also, there is too much theatre involved. And finally, socks. You can enjoy a holiday season without worries if you keep these things in mind.
Industry Insights "Company Security"
The Dangers of DDoS Overconfidence
Cyber Security & Data Protection in Japan
The Human Element of IT Security

Feature "Cybersecurity"
Building Trustworthiness and Acceptance of IT Security Solutions
How can companies create trust in IT security solutions? Through trustworthiness, argue Prof. Norbert Pohlmann from eco & Ulla Coester from xethix Empowerment.
Industry Insights "Cybersecurity"
The Shared Responsibility Model – an Important Basis of Cloud Security
DNS Abuse: Everyone’s Problem

Feature "Cybersecurity"
Current Challenges in EU Telecom Security
What is the current state of security for telecommunications in Europe and what are the challenges telecom companies are facing to keep our communication secure? Dr Dan Tofan, from the EU Cyber Security Agency, ENISA, gives insight into the challenges.
Industry Insights "Cybersecurity"
Reestablishing communications when disaster strikes
Bridging the Digital Divide

Feature "Cybersecurity"
Security Risk Analysis and AI Support
Sebastian Kurowski from the Fraunhofer Institute for Industrial Engineering looks at how artificial intelligence can be used to optimize IT security risk analysis in companies, offering relevant support for ITR specialists and for strategic decision-making.
Industry Insights "Cybersecurity"
Targeted Phishing Emails to Train IT Security Awareness

Feature "Authentication"
Adding Trust & Security to Internet Interactions with DNSSEC
DNSSEC does two things: It ensures you’re talking to the right online resource, and it verifies that the information you receive has not been tampered with, Patrick Koetter from sys4 AG explains.

Feature "Cybersecurity"
Connected Car Security
The potential for the connected car to improve safety on the road is immense, but its ability to do so also depends on the IT security built into the system. dotmagazine spoke to IT security specialist and Member of the Board at the eco Association, Professor Norbert Pohlmann, about the challenges of securing connected cars.
Industry Insights "Cybersecurity"
New Frontiers for Car Security: API Management
Blockchain-based Solutions and IT/Cyber Security for Autonomous Driving – Legal Barriers

Feature "Blockchain"
What Can Blockchain Do For You?
“The Internet never forgets!” Although untrue, this statement reminds people to think twice before putting information online – and out of their control. The advent of blockchain changes everything. Blockchain forgets nothing – and it brings back content control. Mathias Röckel looks at the potential of this new technology for innovative commercial enterprise, as well as for Internet infrastructure providers.

Feature "Cybersecurity"
Ransomware Has Not Just Been Around Since Yesterday
Michael Weirich from the eco Association, on the impact of ransomware on companies and the need for a contingency plan.
Industry Insights "Cybersecurity"
The Sectors at Risk from DDoS and Bot Attacks: How to Stop them

Feature "Quantum Computing"
A Quantum-Safe Future
An interview with Dr. Joachim Schäfer from IBM on quantum computers, the quantum advantage and quantum-safe encryption.

Feature "Cybersecurity"
How Far Should the State Be Allowed to Go for the Purposes of Digital Security?
Klaus Landefeld on responsibility for IT security and how combatting crime has paradoxically become one of the greatest threats to security in cyber space.

Feature "Cybersecurity"
Making Connected Cars Safe
Prof. Norbert Pohlmann from the eco Association looks at how the automotive Internet industries should work together to improve Connected Car security.
Industry Insights "Cybersecurity"
Data Protection for Connected and Autonomous Vehicles

Feature "Branding"
Preventing Counterfeiting and IP Abuse with Customer Engagement
Companies ignore brand protection and the problem of counterfeiting at their own and their customers’ risk, explains Stuart Fuller from CentralNic.
Industry Insights "Branding"
Boost Your Brand and Raise the Bar for Fraud – the Benefits of a dotBRAND
Mitigating Risks for Brands with Smart Domain Management Tactics and Tools
The Importance of a Domain Name and a Trademark to Protect your European Brand
Founder spotlight: Unique Ideas with Creative Domains

Feature "Industrial IoT"
Driving Digital Transformation
Forecasts of social disintegration and wide-spread unemployment caused by Industrial IoT are a melodramatic overreaction stemming from the fear of change. To the horseshoe smithy, the car also posed an existential threat – but does that mean we should return to the dark ages? Judith Ellis explores the attitudes to digital transformation, the challenges from smaller companies, and the steps needed to make it a success.

Feature "Cybersecurity"
Trust & Security in the Blockchain
The early use cases for blockchain technology centered around cryptocurrencies. But the same processes that secure Bitcoin and friends can also be used for securing other forms of data, for example in administration. So, what is it that makes blockchain so secure? Professor Norbert Pohlmann, from the eco Association, explains.
Industry Insights "Cybersecurity"
Securing Smart Contracts
Smart Contract Security – Expect and Deal with Attacks

Feature "Blockchain"
doteditorial: Blockchain & E-Government – Giving Citizens Control of Their Data
E-Government is a major driver of blockchain technology. Stephan Zimprich from fieldfisher looks at how the transparency and immutability of blockchain can help give citizens digital self-determination.
Industry Insights "Blockchain"
Blockchain for Education: Lifelong Learning Passport
Blockchain Technology: A Must for Modern and Forward-Looking IT

Feature "GDPR"
Collaboration across the Atlantic: Data Protection & Internet Policy
Many American companies are still unaware of how the new EU General Data Protection Regulation will affect them. Data protection gurus Thomas Rickert from the eco Association & Christian Dawson from i2Coalition look at how two voices for the Internet are teaming up on GDPR, ICANN, and beyond to ensure that the Internet and the organizations that build it have a voice on both sides of the Atlantic.

Feature "Email Marketing"
doteditorial August 2017
“The Future of Email”, the August 2017 issue of dotmagazine, explores where this essential medium is heading and what its potential is, focusing on email marketing and how to make sure that relevant marketing messages truly reach target customers, and how to beat the email bad guys.

Feature "Smart City"
Cybersecurity is a Key Driver of Smart City Markets
Markus Schaffrin from the eco Association looks at the fundamental importance of security to the success of Smart City projects.
Industry Insights "Smart City"
Remote Work Spells Opportunity for Service Providers
Working Securely at Home – 9 Tips for Company Security
AI and Cybersecurity – What to Expect and How to Protect your Organization
Fortifying Cyberspace: How Innovative Companies from Canada’s Ontario are Protecting Us Against Cyber Attacks

Feature "Cybersecurity"
The Current Situation of IoT Security and What to Do
Hardly any IT market sector in recent years has experienced growth rates like those in IoT, but securing networked devices and IoT structures still lags behind, explains Olaf Pursche from the AV-Test Institute.

Feature "Data Protection & Privacy"
doteditorial December 2017
This festive season, dotmagazine examines what’s involved in keeping your most valuable business assets – your ID, your finances, customer data, and your reputation – safe and secure.