SpotON – our blog around digital compliance in enterprises
SpotON – Digital Compliance
Read here regularly on selected topics, developments and news from the areas:
SAM & Cloud – use software legally compliant and cost-effective
IT Security & Threat Intelligence – protect the IT landscape effectively
Data & Digitization – manage digital assets across the lifecycle
Complion Insights – look behind the scenes of digital compliance consultants
14/04/2022
Everything safe, or what? Philosophy Lesson: Security through Obscurity
In our column "Everything secure, or what?" we regularly discuss individual components of a successful IT security architecture. Today, we want to get a little philosophical and discuss an IT security philosophy that, despite being widely refuted, continues to be mentioned in conversations, especially with IT security laypeople. We are talking about "Security through Obscurity", or STO. We'll discuss why the path of this philosophy often provides only apparent security in this blog post.
Mentoring, MBO and (internal) development at Complion
Bringing personal and professional development in line with corporate goals is the pinnacle of development perspectives for young and experienced management consultants alike. Only "when everyone wins" can successful, long-term collaboration and shared success be ensured. Read this article to find out how we bring this from theory into practice.
Shadow IT refers to IT systems and software products that are used by a company's functional areas alongside the official IT infrastructure and without the knowledge of the IT department. Shadow IT poses a significant risk potential in terms of IT compliance.
Every year, CISOs and CIOs have to negotiate a budget for IT security. If there are no incidents, the money was worth it. But how do you explain that to the board? In this blog post, we provide some strategies and background for successful "Battles of the Boardroom" that can help you as an IT executive.