SpotON – our blog around digital compliance in enterprises
SpotON – Digital Compliance
Read here regularly on selected topics, developments and news from the areas:
SAM & Cloud – use software legally compliant and cost-effective
IT Security & Threat Intelligence – protect the IT landscape effectively
Data & Digitization – manage digital assets across the lifecycle
Complion Insights – look behind the scenes of digital compliance consultants
12/05/2022
Third-party support – opportunity or risk?
Cost increases do not stop at support and maintenance fees for software. One way to reduce costs in the area of software support is to switch to so-called third-party providers, but this entails certain restrictions. This blog post examines the tension between the opportunities and risks of third-party support.
it-sa 365 Webinar 2022: Which information security standard is right for me?
Information security measures have become indispensable in today's world. Especially after the amendment of the German KRITIS Regulation 2021, more and more companies are forced to provide evidence of the functional capabilities of their information security systems. This is done by certifying the ISMS (i.e., information security) according to a recognized standard. The most widely used standards in Germany include the international standard ISO/IEC 27001 and the national standard BSI IT-Grundschutz - But which standard is suitable for your company?
From April 10 - 12, the 11th edition of Software Asset Management Strategies (SAMS for short) took place in Berlin. Complion was there with Stephanie Riesebeck, Frank Salz and Felix Baran. Read about our impressions below.
Everything safe, or what? Philosophy Lesson: Security through Obscurity
In our column "Everything secure, or what?" we regularly discuss individual components of a successful IT security architecture. Today, we want to get a little philosophical and discuss an IT security philosophy that, despite being widely refuted, continues to be mentioned in conversations, especially with IT security laypeople. We are talking about "Security through Obscurity", or STO. We'll discuss why the path of this philosophy often provides only apparent security in this blog post.