top of page
BLOG



🎖️⚖️ Cyber Security and Compliance: Two sides of the same coin? 🎖️⚖️
Why compliance alone does not protect against attacks and a proactive strategy is essential.

Daniel Eberhorn
Aug 19


👀🧠 Security starts with switching off the brain – and real awareness with conscious action
Security awareness is not created through training alone, but through daily behavior. This article explains why cultural design is crucial, how secure habits can be established in the workplace, and why private behavior on social media also impacts professional security. Those who lead by example make security accessible to others.

Daniel Eberhorn
Jul 8


🧠🔐 LLMs in the security check: How AI helps – and at the same time becomes dangerous
LLMs boost IT security — but also create new attack surfaces. The OWASP report reveals where real risks are hiding.

Daniel Eberhorn
Apr 27


🧱 Single point of failure? – 🔍 Is another vulnerability database needed?
The National Vulnerability Database (NVD) is in crisis — delays and missing assessments are undermining global trust. With the launch of the EUVD, Europe introduces its own vulnerability platform. But is a second database truly needed, or are we risking fragmentation over security? This article explores the opportunities, challenges, and strategic relevance of digital sovereignty for Europe.

Daniel Eberhorn
Apr 20


🔎 Browsers as password managers under investigation: 🔐 Technical revolution or risky convenience? ⚠️
Browsers store passwords conveniently but pose risks – for critical accounts, dedicated password managers are the better choice.

Daniel Eberhorn
Apr 6


🚧 Air Gapped – Why the separation is often not one 🚧
Air-gapped systems: often just VLANs instead of real isolation. Why the term rarely delivers what it promises in practice.

Daniel Eberhorn
Mar 3


📂 📊 CVE and CVSS: Basics of vulnerability assessment 📂 📊
CVE identifies vulnerabilities, CVSS assesses their risk. Both help to prioritize and effectively address cyber risks.

Daniel Eberhorn
Mar 3


👥 The human factor in Cyber Security: vulnerability or untapped strength? 👥
Human error is a risk in cyber security. How policies can promote work reality and employee strengths.

Daniel Eberhorn
Feb 14


☁️🔒 Cloud firewalls in focus: How secure is the cloud? 🔒☁️
Native cloud firewalls provide basic protection, but additional measures are essential for comprehensive security.

Daniel Eberhorn
Jan 16


🔍🤖 AI in Cyber Security: Hype or Real Game Changer? 🤖🔍
AI in cyber security: Not a panacea, but a powerful tool – used correctly, it specifically complements human expertise.

Daniel Eberhorn
Jan 7


Prevention alone is not enough: 🔑 The central role of preparation in cyber resilience 🛡️
Prevention is not enough: preparation can minimize damage from cyber attacks and build confidence in corporate security.

Daniel Eberhorn
Dec 28, 2024


💠🔗 Quantum computing and encryption: How secure will encryption be tomorrow? 🔗💠
Quantum computing poses major challenges for IT security – but it also opens up opportunities for a secure future.

Daniel Eberhorn
Dec 16, 2024


💳📱Apple Pay vs. Google Pay: Comparison of security for mobile payments 📱💳
Apple Pay vs. Google Pay in comparison: security, functions and differences of the mobile payment services at a glance.

Daniel Eberhorn
Dec 9, 2024


Cyber Threat Landscape 2025: 🔮 A look at the future of cyber security 🔮
Cyber Threat Landscape for 2025: A look at trends such as AI, quantum computing & increasing cyber attacks. Recognize risks & act!

Daniel Eberhorn
Dec 2, 2024


🦖💻 Cyber relics: Why vulnerability scanners should end up in a museum 💻🦖
Why vulnerability scanners will soon be a thing of the past and how modern pentests can better protect companies from cyber threats.

Daniel Eberhorn
Nov 14, 2024


🕵️♀️💻 When attackers pose as IT support: next-generation social engineering 🕵️♀️💻
Cybercriminals are using Microsoft Teams for sophisticated social engineering attacks. Find out how companies can protect themselves.

Daniel Eberhorn
Nov 7, 2024


🚨 Goodbye to password changes? Why BSI and NIST are only partially right! 🚨
Goodbye to password changes? Why the new NIST and BSI recommendations are useful, but still not risk-free.

Daniel Eberhorn
Oct 8, 2024


🛡️ The attack surface of a company: Through the eyes of a hacker 🔍
Discover the importance of managing a company's attack surface to prevent cyberattacks and ensure robust security measures.

Daniel Eberhorn
Sep 27, 2024


⚙️ Authentication Reinvented: Passwordless in the Digital Future 🌍
Discover how passwordless and biometric authentication can transform enterprise security. Protect your data efficiently in the digital age.

Daniel Eberhorn
May 18, 2024


🎭👁️ From Illusion to Reality: The Dark Sides of Multi-Factor Authentication (MFA) 👁️🎭
Discover hidden MFA risks and strengthen your cybersecurity defenses.

Daniel Eberhorn
Apr 27, 2024
bottom of page