Everything’s secure, right? – Our IT-Security Section of the COMPLION Blog
Complion offers comprehensive consulting in IT asset management. This concerns software and license management, digital compliance, and cybersecurity. We will deal with the latter in detail in our section “Everything’s secure, right?”–Not just for specialists and nerds, but quite unpretentiously and without a lot of technical jargon, we want to address and explain the topic of IT security here.
IT security is an integral part of general corporate security. Just as people used to keep the secret lemonade formula in a safe, today they encrypt data and hide it behind firewalls and other security measures to prevent unauthorized access. The subject is far-reaching and even seasoned experts cannot know everything. So, you have to approach IT security one slice at a time to develop an understanding.
In our column "Everything’s secure, right?" we will do just that. Bite-sized pieces of IT security, published at regular intervals. We will look at individual components of Information Security Management Systems (ISMS), i.e. the toolbox of IT security experts, as well as discussing the big questions of IT security. These include the question of how to reconcile security and user-friendliness or a treatise on different IT security philosophies.
So, it will be exciting and a long journey through the topic of IT security. We would be delighted if you would join us on this journey. The posts stand on their own, so you don't need to know about previously published blogposts.
Links to some previously published articles in this section can be found here under this post.
Author: Tobias Philipsen
Our blog post on the log4j vulnerability you can find by clicking here.
Our blog post on the importance of human generated threat intelligence you can find by clicking here