top of page
BLOG



Daniel Eberhorn
Dec 2, 2024
Cyber Threat Landscape 2025: 🔮 A look at the future of cyber security 🔮
Cyber Threat Landscape for 2025: A look at trends such as AI, quantum computing & increasing cyber attacks. Recognize risks & act!


Daniel Eberhorn
Nov 14, 2024
🦖💻 Cyber relics: Why vulnerability scanners should end up in a museum 💻🦖
Why vulnerability scanners will soon be a thing of the past and how modern pentests can better protect companies from cyber threats.


Daniel Eberhorn
Oct 8, 2024
🚨 Goodbye to password changes? Why BSI and NIST are only partially right! 🚨
Goodbye to password changes? Why the new NIST and BSI recommendations are useful, but still not risk-free.


Daniel Eberhorn
Sep 27, 2024
🛡️ The attack surface of a company: Through the eyes of a hacker 🔍
Discover the importance of managing a company's attack surface to prevent cyberattacks and ensure robust security measures.
bottom of page