Security
Feature "Security"
Security, Trust & Compliance - Call for Contributions
Security is crucial for building trust in interconnected digital systems, including AI-powered solutions, IoT, and cloud. dotmagazine’s Call for Contributions on the benefits of robust security for corporate IT, IoT, and digital infrastructure in our increasingly digital world.
Feature "Security"
Digital Security, Trust & Consumer Protection – Call for Contributions
Feature "DNS"
QPI: A “Call to Arms” on Responsible Growth
Inma Del Rosal Mendez and Brian Cimbolic from PIR explain how the Quality Performance Index supports a reduction in abusive domain registrations.
Feature "Security"
Open and Secure Communication Platforms for Cooperation and Innovation
Using Ethernet VLANs for secure connections - the community ecosystems of the future? Jeroen van de Lagemaat from NDIX talks about securing health and emergency services.
Feature "DNS"
Let’s End Counter-Productive Anti DNS Abuse Reporting
Natasha Pelham-Lacey from CleanDNS, on improving an imperfect system to lower the bar for reporting abuse and increasing takedowns.
Feature "DNS"
Evidence Equals Better DNS Abuse Mitigation
Gia Isabella from CleanDNS addresses the creation of standards for evidence of Internet abuse to expedite the handling of abusive content.
Feature "DNS"
DNS Abuse: Everyone’s Problem
Lars Forsberg from iQ looks at the need for awareness of DNS abuse, especially of the new gTLDs, because with awareness comes the ability to act.
Feature "Artificial Intelligence"
AI and Cybersecurity – What to Expect and How to Protect your Organization
Innovations in AI are making social engineering attacks on companies more effective, explains Dr. Niklas Hellemann from SoSafe Cyber Security Awareness.
Feature "Cybersecurity"
The Human Element of IT Security
Human behavior can undermine the development of an effective IT security culture in companies at home and abroad. In particular, cultural differences in the approach to IT security must be taken into account in order to mitigate possible risks.
Feature "Data Protection & Privacy"
Protecting Your Business: Data Security Strategies for Circular IT Hardware
With more companies turning to circular IT hardware as a sustainable solution, Ynvolve’s Thomas Amberg explains why securing data on refurbished systems is vital for protecting sensitive information and maintaining trust.
Feature "Domains"
Where DORA and DMARC Meet: Enhancing Financial Sector Resilience through Email Security
Matia Boldrini from Dmarcian examines how DMARC complements the Digital Operational Resilience Act (DORA), enhancing email security to bolster digital acceleration and strengthen the financial sector's resilience.
Feature "Cybersecurity"
Whatever, put a chip in it
The careless days in IoT are numbered: Sebastian Floss explores the value of Security by Design for IoT devices, and offers 4 simple rules to get started.
Feature "Email"
Bringing Email Security into the Mainstream: A Call to Action for Companies
In the face of escalating cyber threats, email security is emerging as a crucial battleground for businesses of all sizes. The eco Association’s Michael Weirich urges companies to elevate their defenses and explains how they can fortify their digital communications against increasingly sophisticated attacks.
Feature "Security"
Governments are Embracing Hacking: What does that Mean for Everyone Else?
Governments’ eagerness to avail of hacking has helped generate a dubious ‘grey market’ for zero-day vulnerabilities, warns Ryan Polk from the Internet Society.
Feature "Brands"
Brand Abuse: How to Detect Threats Before Your Customers Do
In this article, Sven Krohlas, a Detection Engineer at Spamhaus Technology, explores how brands can detect threats earlier and respond quickly to keep insurance premiums low and prevent damage costs from spiraling.
Feature "Security"
Privacy by Design in Product Development
Data protection and user privacy have become much more important for the development of digital products. Jutta Horstmann from eyeo explains how companies can implement a Privacy by Design approach in product development, and how this can support rather than hinder innovation.
Feature "Digital Infrastructure"
The Hidden Trap of Vendor Lock-in: How MSPs Can Escape With Hybrid IT
Thomas Amberg from Ynvolve reveals how MSPs can escape vendor lock-in and enhance flexibility by adopting a hybrid IT strategy that combines new & circular hardware.
Feature "Data Center"
Next Level Data Center Security
Toan Nguyen from e-shelter explores secure access to data centers thanks to hand vein scanners and blockchain.
Feature "DDoS"
The Dangers of DDoS Overconfidence
Chris Townsley, EMEA Director at CDNetworks, discusses the rising threat of DDoS attacks, and the misplaced confidence of European businesses in their ability to overcome cyber attacks.
Feature "Data Center"
Understanding and Mitigating Risks to Data Center Operation
Given the strategic value of data centers to digital transformation, it is important for data center operators to have a very clear view of the risks they face – ranging from DDoS to the GDPR – according to Gerd Simon, Independent Consultant and Lead Auditor for the eco Datacenter Star Audit.
Feature "IoT"
Smart Lock Market Growth Boosted By the Rising Popularity of Smartphones
Smart lock technology simplifies access management for both users and administrators, without compromising security, writes Sanna Räsänen from Herman IT.
Feature "Security"
Email Security and Branding Impact Combined: Why DMARC and BIMI are Essential for Companies
Implementing DMARC and BIMI is crucial for enhancing email security and branding, as highlighted by Jochen Schönweiß from Nameshield regarding a study on Germany’s e-commerce sector.
Feature "Cloud Native"
When Hacks Target Software: What SMEs Should Know About Cloud Native Technology
Nils Klute from EuroCloud explains how IT risks such as log4j can be easily fended off with cloud native technologies.
Feature "DNS"
DNS Tips: Securely Operating Authoritative Name Servers and Protecting Against Outages
Klaus Darilion from nic.at shares crucial tips in two core videos for securing authoritative name servers and protecting domains during outages.
Feature "Networks"
Business Continuity in Lockdown
Shifting workloads, managing security breaches, and serving customers remotely – Sylvia List from NTT Germany explains companies’ evolving reactions to lockdown.
Feature "Security"
The Shared Responsibility Model – an Important Basis of Cloud Security
Sebastian Grau from root360 provides an overview of the security responsibilities for companies, MSPs and cloud service providers for safeguarding sensitive data.
Feature "Security"
Saving your Data for the Day After Tomorrow
In 2019, a record 50 exabyte of data was delivered on tape globally. Melina Schnaudt from Fujifilm Recording Media GmbH explains why tape is standard in the field of data archiving now and will continue to be in the future.
Feature "Artificial Intelligence"
Maintain Connectivity and Security for AI-Based Apps
Unlock the potential of generative AI via the security company F5 and explore how to connect, secure, and scale your AI workloads seamlessly on a single platform.
Feature "DDoS"
Carpet Bombing on Digital Infrastructures – Pragmatic Approaches in DDoS Protection and Data Protection
New attack types like Carpet Bombing require specialized protection of hosting & ISP IT landscapes, warns Michael Hempe from Link11 GmbH.
Feature "Security"
Smartphones as Wallet for the Future?
Christian Lueg from ESET sheds light on what our smartphone knows about us, and how to improve privacy and security on it.
Feature "Interconnection"
Improving the Security and Resilience of the Internet through MANRS
MANRS brings together network operators, ISPs, and IXPs to improve routing hygiene, increasing the security and resilience of the Internet, Christoph Dietzel from DE-CIX explains.
Feature "Data Sovereignty"
Navigating Cross-Border Data Compliance in a Global Regulatory Landscape
Ryan Miller from Impossible Cloud explores the essential strategies for managing cross-border data compliance and GDPR challenges, ensuring robust data sovereignty in an increasingly globalized world.
Feature "IoT"
Securing IoT: Closing the Gateway into the Company Network
Maik Morgenstern, CTO of the AV-TEST Institute, reports on how the AV-ATLAS collects data about attacks on the Internet of Things (IoT) and supports in defending against them.
Industry Insights "IoT"
Shaping the Digital Production Age
Feature "Identity Management"
Securing Hospital Workplaces
How can hospitals not just boost quality of care, but also upgrade security? Dr. Nils Kaufmann, OGiTiX Software, explains how the merger of two health tech giants creates a 360° IAM set of solutions for hospitals.
Feature "Security"
The Sectors at Risk from DDoS and Bot Attacks: How to Stop them
Andrew Slastenov from Gcore, on the risks of DDoS and bots and how to protect company systems and networks.
Feature "Cybersecurity"
360 Degree Security: Why Do We Need to Look Beyond Just Cybersecurity?
Security today goes far beyond just cybersecurity, as Thomas Tschersich from Telekom Security emphasized at eco’s Internet Security Days. He highlights the need for a 360-degree approach that addresses cyber threats, workforce challenges, geopolitical risks, and supply chain vulnerabilities.
Industry Insights "Cybersecurity"
The Hidden Trap of Vendor Lock-in: How MSPs Can Escape With Hybrid IT
Brand Abuse: How to Detect Threats Before Your Customers Do
Feature "Email"
Enhancing Email Security: A Collective Responsibility
Claudia Plattner, President of the BSI, calls for collective action in enhancing email security amidst growing cyber threats. As outdated email systems continue to expose vulnerabilities, the tools to strengthen our digital communications are already within reach – it's time to put them to use.
Feature "Company Security"
Why More and More Companies Move their Data to Tape
2019 was a record-breaking year for tape technology: never before has so much capacity been delivered on tape. Melina Schnaudt from Fujifilm Recording Media GmbH shows why.
Feature "Connectivity"
When Time Stands Still: Why Redundant Connectivity Is Essential in the Digital Age
Dr. Thomas King, CTO at DE-CIX, explains why companies should secure their IT infrastructure via redundant lines, and what exactly lies behind the term redundancy.
Industry Insights "Connectivity"
Securing Hospital Workplaces
Feature "DDoS"
The Most Dangerous DDoS Attacks of our Time
Dmitry Samoshkin from G-Core Labs advises on what you need to know about DDoS attacks and how to prepare for them.
Feature "Security"
Cyber Security in the EU
First EU-wide cyber security rules established - What's new for European companies? Interview with Thorsten Ihler from Fieldfisher
Feature "DNS"
Next Steps in Combatting DNS Abuse
Thomas Rickert and Lars Steffen from the eco Association take stock and give an outlook on collaborating in the fight against abuse involving the DNS.
Feature "Company Security"
Why IT Security is Like Shopping for Christmas
There are three striking similarities between IT security and shopping for Christmas. Most of us have too much stuff to begin with. Also, there is too much theatre involved. And finally, socks. You can enjoy a holiday season without worries if you keep these things in mind.
Industry Insights "Company Security"
The Dangers of DDoS Overconfidence
Cyber Security & Data Protection in Japan
The Human Element of IT Security
Feature "Cloud Computing"
Baking Security into the Cloud: DevSecOps and Cloud Native
Developers, operations professionals, and security experts need to work hand-in-hand in the public cloud to ensure the security of applications, writes Nils Klute from EuroCloud.
Feature "Artificial Intelligence"
Artificial Intelligence and IT Security - More Security, More Threats
Prof. Norbert Pohlmann from eco investigates the dual role of AI as both a powerful security asset and a potential attack vector. He highlights the importance of securing AI systems while underscoring the need for human oversight in critical areas to ensure safety and trust.
Industry Insights "Artificial Intelligence"
Maintain Connectivity and Security for AI-Based Apps
Feature "Networks"
Measuring Internet Routing Security
Megan Kruse from the Internet Society introduces the Mutually Agreed Norms for Routing Security (MANRS) initiative, which addresses the most common routing threats.
Feature "Networks"
How can Enterprises Safeguard their Data and Digital Resources?
Dr. Thomas King from DE-CIX explains how an IX platform can shield networks from a range of malicious and accidental security incidents.
Industry Insights "Networks"
Carpet Bombing on Digital Infrastructures – Pragmatic Approaches in DDoS Protection and Data Protection
Feature "E-Health"
Healthy and Secure – the DNS as a Key Component for a VPN
Security is architecturally anchored in telematics infrastructure to protect e-health applications from abuse, says Sven-Holger Wabnitz from CentralNic.
Industry Insights "E-Health"
Cybersecurity in the Hospital Environment – How can Hospitals Protect Themselves from Hacker Attacks?
Feature "IoT"
Security by Design – New Security Testing Standard for IoT Devices
Tatjana Hein and Cornelia Schildt from the eco Association give an insight into the development of a security standard and label for IoT.
Industry Insights "IoT"
Smartphones as Wallet for the Future?
Congratulations on Your New Business – We Need to Talk
Feature "Security"
Finding and Retaining IT Security Experts: Five Tips for Companies
Building on eco’s IT Security Survey 2024, Cornelia Schildt offers practical strategies for companies facing challenges in hiring and retaining IT security talent.
Feature "Security"
Mandatory Certifications Key to Increased IoT Security
How can Europe-wide standards help close security vulnerabilities and gateways, and ensure secure IoT devices? Tatjana Hein from eco explores the possibilities.
Industry Insights "Security"
When Hacks Target Software: What SMEs Should Know About Cloud Native Technology
Not in Our Domain: How EURid is Using AI and Global Cooperation to Tackle Cybercrime
Control Your Digital Brand: On the Interplay of Defensive Domain Registrations, Active Monitoring, and Brand Enforcement
Feature "Cybersecurity"
Ransomware Has Not Just Been Around Since Yesterday
Michael Weirich from the eco Association, on the impact of ransomware on companies and the need for a contingency plan.
Industry Insights "Cybersecurity"
The Sectors at Risk from DDoS and Bot Attacks: How to Stop them
Feature "IoT"
Securing Intelligent Healthcare
Verizon’s Alexander Schlager looks at security threats for IoT solutions in healthcare, and what to do about them.
Feature "New Work"
Safe & Secure Technology & Tools in the Hybrid World of Work
Seeking to bolster the safe & secure use of New Work technology and tools in post-Covid times? Pick up a range of tips from eco experts and partners.
Feature "Security"
Trustworthiness Creates Trust
Prof. Norbert Pohlmann from the eco Association and Ulla Coester from xethix Empowerment on the approach IT companies need to take to engender trust.
Industry Insights "Security"
DMARC is Here to Stay. Now What?
Feature "Internet Governance"
Working Together Towards Trust – doteditorial
The joined forces of many different stakeholders is needed to allow trust in digitalization to flourish, says Lars Steffen, Director of eco International.
Industry Insights "Internet Governance"
Legality, Security & Ethics in the Digitalized World
Creating a Federated Blockchain as a Service Platform
Feature "DNS"
Why Preventing, Mitigating & Fighting Abuse Concern Everyone
Thomas Rickert and Lars Steffen from the eco Association, on the importance of acting and collaborating in the fight against abuse involving the DNS.
Feature "Security"
Cybersecurity & Data Protection – Public Security & Individual Freedom: doteditorial
For society to accept and use IT technologies and services, they must be secure and trustworthy. Prof. Norbert Pohlmann, Board Member for IT Security at eco Association, explores the balancing of state, community, and individual needs for cyber protection.
Feature "Security"
IT Technologies Need to Become Significantly More Robust for the Digital Future
To prevent future disruptions from minor software errors, Prof. Dr. Norbert Pohlmann from eco highlights the urgent need for robust IT security architectures.