Digitale Agenda – Quo vadis?

Die Informations- und Kommunikationstechnologie (IKT) ist zum Nervensystem unserer “smarten” Gesellschaft geworden. Und trotzdem haben wir noch keine flächendeckende digitale Agenda in der öffentlichen Verwaltung, wie unsere letzte Studie ergeben hat. 

ISMS-Alternativen zum BSI Grundschutztool

Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat mit dem IT Grundschutz eine Methode für ein effektives Management der Informationssicherheit entwickelt. Sie lässt sich flexibel an die Gegebenheiten einer Organisation anpassen. Ebenso lassen sich Gefährdungen und Risiken ermitteln und Maßnahmen für den betroffenen Geltungsbereich (IT-Verbund) ableiten.

Yes we are Open – Cybersecurity and the Future of Retail

Authors: Alexander Schellong, Jens Michael Marohn, Wolfgang Kiener According to a recent survey conducted by Forrester, an independent research firm, 97% of respondents prioritize digital innovation and Cybersecurity in 2015. In a way this comes at no surprise to the readership of this blog as the spike of cyber incidents at major retailers in 2014 and 2015 showed that they are open for customers and cybercriminals at the same time. Stationary and online retailers are a sweet spot for the latter as billions of customer transactions…

Cybersecurity vs. Data Protection

When it comes to protection of data, the terms Cybersecurity and data protection – are used synonymously. Both strive to protect data from being misused, lost, changed, exfiltrated or published without proper authorization and control mechanisms. However, there is one major difference.

Cybersecurity: Big Opportunities for Big Data

What has Big Data been up to? Big Data has been a major topic in the IT realm for years. The terms Big Data and Big Data analytics are generally used to describe the potential for new insights into our environment by making sense of the rapidly increasing amount of information produced by the growing number of connected devices. But what is the bigger picture in the potential of Big Data in cybersecurity?

Copyright 2016 21st CENTURY IT · RSS Feed · Anmelden