top of page
BLOG


🧠🧑💻 From feeling to facts: Password security in reality check
Was ist ein sicheres Passwort – Bauchgefühl oder Kryptografie?
Eine Analyse des Fortinet-Leaks mit über 76.000 realen Zugangsdaten zeigt, wie erschreckend aktuell triviale Muster wie „Summer2021!“ noch immer sind. Zwischen menschlicher Merklogik und technischer Realität offenbart sich ein gefährlicher Spalt. Dieser Beitrag bringt Struktur in die Debatte – faktenbasiert, praxisnah und mit klarem Blick auf Risiken.

Daniel Eberhorn
Dec 31, 2025


🔐📎🧠 When “123456” becomes reality – a heckle at lived security culture
Ein Admin-Zugang mit dem Passwort „123456“ auf der McDonald’s-Bewerbungsplattform – kein Einzelfall, sondern ein Spiegel für ein grundlegendes Problem: Policies sind nicht gleich gelebte Sicherheit. Dieser Artikel verbindet reale Vorfälle mit dem Gedanken bewussten Handelns und zeigt, warum Security mehr ist als Technik.

Daniel Eberhorn
Sep 27, 2025


🎖️⚖️ Cyber Security and Compliance: Two sides of the same coin? 🎖️⚖️
Why compliance alone does not protect against attacks and a proactive strategy is essential.

Daniel Eberhorn
Aug 19, 2025


👀🧠 Security starts with switching off the brain – and real awareness with conscious action
Security awareness is not created through training alone, but through daily behavior. This article explains why cultural design is crucial, how secure habits can be established in the workplace, and why private behavior on social media also impacts professional security. Those who lead by example make security accessible to others.

Daniel Eberhorn
Jul 8, 2025


🧠🔐 LLMs in the security check: How AI helps – and at the same time becomes dangerous
LLMs boost IT security — but also create new attack surfaces. The OWASP report reveals where real risks are hiding.

Daniel Eberhorn
Apr 27, 2025


🧱 Single point of failure? – 🔍 Is another vulnerability database needed?
The National Vulnerability Database (NVD) is in crisis — delays and missing assessments are undermining global trust. With the launch of the EUVD, Europe introduces its own vulnerability platform. But is a second database truly needed, or are we risking fragmentation over security? This article explores the opportunities, challenges, and strategic relevance of digital sovereignty for Europe.

Daniel Eberhorn
Apr 20, 2025


🔎 Browsers as password managers under investigation: 🔐 Technical revolution or risky convenience? ⚠️
Browsers store passwords conveniently but pose risks – for critical accounts, dedicated password managers are the better choice.

Daniel Eberhorn
Apr 6, 2025


🚧 Air Gapped – Why the separation is often not one 🚧
Air-gapped systems: often just VLANs instead of real isolation. Why the term rarely delivers what it promises in practice.

Daniel Eberhorn
Mar 3, 2025


📂 📊 CVE and CVSS: Basics of vulnerability assessment 📂 📊
CVE identifies vulnerabilities, CVSS assesses their risk. Both help to prioritize and effectively address cyber risks.

Daniel Eberhorn
Mar 3, 2025


👥 The human factor in Cyber Security: vulnerability or untapped strength? 👥
Human error is a risk in cyber security. How policies can promote work reality and employee strengths.

Daniel Eberhorn
Feb 14, 2025


☁️🔒 Cloud firewalls in focus: How secure is the cloud? 🔒☁️
Native cloud firewalls provide basic protection, but additional measures are essential for comprehensive security.

Daniel Eberhorn
Jan 16, 2025


🔍🤖 AI in Cyber Security: Hype or Real Game Changer? 🤖🔍
AI in cyber security: Not a panacea, but a powerful tool – used correctly, it specifically complements human expertise.

Daniel Eberhorn
Jan 7, 2025


Prevention alone is not enough: 🔑 The central role of preparation in cyber resilience 🛡️
Prevention is not enough: preparation can minimize damage from cyber attacks and build confidence in corporate security.

Daniel Eberhorn
Dec 28, 2024


💠🔗 Quantum computing and encryption: How secure will encryption be tomorrow? 🔗💠
Quantum computing poses major challenges for IT security – but it also opens up opportunities for a secure future.

Daniel Eberhorn
Dec 16, 2024


💳📱Apple Pay vs. Google Pay: Comparison of security for mobile payments 📱💳
Apple Pay vs. Google Pay in comparison: security, functions and differences of the mobile payment services at a glance.

Daniel Eberhorn
Dec 9, 2024


Cyber Threat Landscape 2025: 🔮 A look at the future of cyber security 🔮
Cyber Threat Landscape for 2025: A look at trends such as AI, quantum computing & increasing cyber attacks. Recognize risks & act!

Daniel Eberhorn
Dec 2, 2024


🦖💻 Cyber relics: Why vulnerability scanners should end up in a museum 💻🦖
Why vulnerability scanners will soon be a thing of the past and how modern pentests can better protect companies from cyber threats.

Daniel Eberhorn
Nov 14, 2024


🕵️♀️💻 When attackers pose as IT support: next-generation social engineering 🕵️♀️💻
Cybercriminals are using Microsoft Teams for sophisticated social engineering attacks. Find out how companies can protect themselves.

Daniel Eberhorn
Nov 7, 2024


🚨 Goodbye to password changes? Why BSI and NIST are only partially right! 🚨
Goodbye to password changes? Why the new NIST and BSI recommendations are useful, but still not risk-free.

Daniel Eberhorn
Oct 8, 2024


🛡️ The attack surface of a company: Through the eyes of a hacker 🔍
Discover the importance of managing a company's attack surface to prevent cyberattacks and ensure robust security measures.

Daniel Eberhorn
Sep 27, 2024
bottom of page


