SpotON – our blog around digital compliance in enterprises
SpotON – Digital Compliance
Read here regularly on selected topics, developments and news from the areas:
SAM & Cloud – use software legally compliant and cost-effective
IT Security & Threat Intelligence – protect the IT landscape effectively
Data & Digitization – manage digital assets across the lifecycle
Complion Insights – look behind the scenes of digital compliance consultants
14/04/2022
Everything safe, or what? Philosophy Lesson: Security through Obscurity
In our column "Everything secure, or what?" we regularly discuss individual components of a successful IT security architecture. Today, we want to get a little philosophical and discuss an IT security philosophy that, despite being widely refuted, continues to be mentioned in conversations, especially with IT security laypeople. We are talking about "Security through Obscurity", or STO. We'll discuss why the path of this philosophy often provides only apparent security in this blog post.
Mentoring, MBO and (internal) development at Complion
Bringing personal and professional development in line with corporate goals is the pinnacle of development perspectives for young and experienced management consultants alike. Only "when everyone wins" can successful, long-term collaboration and shared success be ensured. Read this article to find out how we bring this from theory into practice.
Shadow IT refers to IT systems and software products that are used by a company's functional areas alongside the official IT infrastructure and without the knowledge of the IT department. Shadow IT poses a significant risk potential in terms of IT compliance.
Every year, CISOs and CIOs have to negotiate a budget for IT security. If there are no incidents, the money was worth it. But how do you explain that to the board? In this blog post, we provide some strategies and background for successful "Battles of the Boardroom" that can help you as an IT executive.
On getting into boutique management consulting and deciding against working for large corporate consultancies.
As a boutique consultancy, satisfied and successful employees are our best advertisement. One of our employees was interviewed for a book project about her start at Complion.
IT security is a race. Vulnerabilities must be closed by administrators faster than malicious actors can exploit them. This is the only way to avert damage of potentially business-destroying proportions. Can defenders win this race?
Equality in Idea Generation: a true USP of Complion
Who does not know the following situation? The managing director / division head makes a suggestion and everyone applauds. In many companies, it is common practice that senior management is basically given the go-ahead and feedback meanders from "top to bottom". Our company works differently: Equality in Idea Generation.
License management for embedded software – Have license managers missed something?
The implementation of a license, and software asset management (SAM) for the specific software in the development cycle of embedded software/systems ensures the efficient use of company assets. Those looking for potentials to exploit can score here.
Security and usability - the eternal conflict or peace in sight?
"The most secure computer in the world has no network access, no users and is buried in a box" - every IT security expert hears this statement from superiors within the first five days of starting their careers. How usability and security can still be combined in IT operations is now a discussion that is taking on almost philosophical proportions. In this blog post, we want to highlight the challenges that IT environments trimmed only for security and not for usability pose to users. Furthermore, we want to make some suggestions on how to keep user frustration from boiling over while maintaining adequate security measures.
This year, we were once again guests at the FH Aachen to present the various opportunities for working at Complion to students. To illustrate the daily project routine, the students were invited to dive straight into the middle of things instead of just watching: it was time for a decision-making processes during a hacker attack.
Everything’s secure, right? – Our IT-Security Section of the COMPLION Blog
Complion offers comprehensive consulting in IT asset management. This concerns software and license management, digital compliance, and cybersecurity. We will deal with the latter in detail in our section “Everything’s secure, right?” – Not just for specialists and nerds, but quite unpretentiously and without a lot of technical jargon, we want to address and explain the topic of IT security here.
Software Asset Management (SAM) is constantly confronted with technological, organizational and external changes (e.g. license model changes). Only those who actively shape these themselves will be able to keep compliance risks at bay and leverage efficiency potentials in software licensing.
Read here how our blog can support you with a 360-degree view of SAM.