David GugelmannSupply chain attacks. The open back door into your IT networkCyber attackers typically exploit a company’s weakest link to break in and steal data or launch a ransomware attack. Thus, the better you…May 25, 2020May 25, 2020
David GugelmannThe timeline of a ransomware attackInfiltration: As a first step, the attacker needs to get into the attacked company’s network. The two main company infiltration vectors…May 11, 2020May 11, 2020
David GugelmannIt’s a jungle out there!Today I will take you on a brief expedition through the cyber security jungle.Apr 27, 2020Apr 27, 2020
David GugelmannYou can’t protect what you can’t seeWhen IT networks merely consisted of employees’ computers, visibility was only a question of keeping a complete directory. Today, networks…Mar 30, 2020Mar 30, 2020