top of page
BLOG



Daniel Eberhorn
Feb 14
👥 The human factor in Cyber Security: vulnerability or untapped strength? 👥
Human error is a risk in cyber security. How policies can promote work reality and employee strengths.


Daniel Eberhorn
Jan 16
☁️🔒 Cloud firewalls in focus: How secure is the cloud? 🔒☁️
Native cloud firewalls provide basic protection, but additional measures are essential for comprehensive security.


Daniel Eberhorn
Jan 7
🔍🤖 AI in Cyber Security: Hype or Real Game Changer? 🤖🔍
AI in cyber security: Not a panacea, but a powerful tool – used correctly, it specifically complements human expertise.


Daniel Eberhorn
Dec 9, 2024
💳📱Apple Pay vs. Google Pay: Comparison of security for mobile payments 📱💳
Apple Pay vs. Google Pay in comparison: security, functions and differences of the mobile payment services at a glance.


Daniel Eberhorn
Dec 2, 2024
Cyber Threat Landscape 2025: 🔮 A look at the future of cyber security 🔮
Cyber Threat Landscape for 2025: A look at trends such as AI, quantum computing & increasing cyber attacks. Recognize risks & act!


Daniel Eberhorn
Oct 8, 2024
🚨 Goodbye to password changes? Why BSI and NIST are only partially right! 🚨
Goodbye to password changes? Why the new NIST and BSI recommendations are useful, but still not risk-free.


Daniel Eberhorn
Sep 27, 2024
🛡️ The attack surface of a company: Through the eyes of a hacker 🔍
Discover the importance of managing a company's attack surface to prevent cyberattacks and ensure robust security measures.


Daniel Eberhorn
May 18, 2024
⚙️ Authentication Reinvented: Passwordless in the Digital Future 🌍
Discover how passwordless and biometric authentication can transform enterprise security. Protect your data efficiently in the digital age.


Daniel Eberhorn
Apr 27, 2024
🎭👁️ From Illusion to Reality: The Dark Sides of Multi-Factor Authentication (MFA) 👁️🎭
Discover hidden MFA risks and strengthen your cybersecurity defenses.


Daniel Eberhorn
Apr 17, 2024
⚠️ Zip-Domains: Why They Were a Bad Idea ⚠️
Learn why .zip TLDs pose a security risk and how you can protect yourself.


Daniel Eberhorn
Apr 8, 2024
🛡️💼 'Tycoon' Malware Kit Bypasses Microsoft and Google MFA Protection 💼🛡️
Tycoon 2FA PhishKit: A Sophisticated Threat Bypassing Microsoft and Google MFA Protection.


Daniel Eberhorn
Apr 2, 2024
🔒 Ransomware Unveiled: How It Works, RaaS & Its Impact on Businesses 🚨
Discover all about ransomware: From how it works and RaaS to its impact and protection.


Daniel Eberhorn
Mar 24, 2024
🔒 Upgrade or take risks? Cybercrime doesn't wait! 🔒
In the world of cyber security, we often find ourselves on the edge of a constant challenge between development and the hackers.
bottom of page