Reports and background information on the topic of cyber security – from IT security and security & compliance to identity & access to data protection / EU GDPR


The Digital Operational Resilience Act (DORA) is an EU regulation (EU 2022/2554) that affects almost all institutions and companies in the financial sector. It is intended to ensure that financial institutions secure their digital systems against cyber threats and technical disruptions….



Theory is good, practice is better – the relevance of examples becomes particularly clear in pentesting. In order to make security gaps tangible, CONET relies on practical scenarios in its pentests. This involves so-called kill chains…


Photo: Cyber ​​security lock floats in an outstretched hand


A penetration test (pentest) is a powerful tool for improving IT security – but without the right preparation, it can also pose risks. Companies often ask themselves: What do I have to pay attention to during a pen test…


Graphic: Digitally networked world map


Improving leadership skills is one of today's key defense challenges. This has not only been true since the oft-cited turning point. The constant improvement, adaptation and use of new technologies and possibilities is…


Photo: User operates screen with digital security lock


Penetration tests (pentests for short) are used to put the IT security of companies to the test. But how do you proceed in a structured and responsible manner? At CONET, every pentest is a systematic review of the current security situation…


Photo: OSINT laptop search query


In the digital age, huge amounts of publicly accessible data are generated every day. Drawing the right information and insights from this huge amount of data holds great potential, but at the same time is a major challenge. Here…


Digital Forensics


Every action on an information technology system such as a computer leaves traces. Forensics experts can use these traces to draw conclusions about activities on the computer or IT system and thus solve crimes such as hacker attacks or malware infections. How to go…


Screenshot: Webinar IT management as a success factor of digitalization using the example of the Bundeswehr


Like other public institutions, the Bundeswehr is continuously modernizing its IT landscape in order to meet current and future challenges, accelerate processes and ensure collaboration nationally and internationally. A variety of projects and programs from the past…



From now on, we would like to regularly inform you about current aspects of the digital transformation of public administration and our administrative projects with our Public Sector topic specials. The first special focuses on the Online Access Act (OZG), which…



Source: https://www.conet.de/blog/category/cyber-security/

Leave a Reply