Article

Articles by our Consultants

PQC_Hammer

Post Quantum Cryptography - Do the Locks Used Hold Up?

From Markus Günther 11.09.2024

Shopping, making cashless payments, ordering online, signing contracts without a pen - our everyday lives are more convenient than ever. Many things require little effort and we hardly think about the complex mechanics behind these processes. Trust in the reliability of our digital world is high. But is this trust really justified?

Experts have been warning for...

Read more...

Iceberg

Security Culture is more than Awareness

From Markus Günther 08.07.2024

In its latest report, the Cyber Safety Review Board (CSRB), a special commission of the US government, found Microsoft to have an “inadequate security culture”. This was identified as a major cause of a massive global security incident in 2023. While this clear, public indictment is surprising, it shows what can happen if this part of the corporate culture...

Read more...

SecurityStrategy

Chat Applications Effectively Monitored by the SOC

From Michael Veser 17.06.2024

Chat applications have become an essential part of our digital lives and offer a platform for real-time communication and interaction. At the same time, they have increasingly become targets for cyberattacks due to their widespread use and central importance. Attackers often try to trick chatbots into performing unwanted actions. This is done using techniques such as...

Read more...

SolutionEvaluation

How you can Incorporate your Company's own Data into a Generative AI Application

From Michael Veser 10.06.2024

This article explains the technical basics of generative AI systems. It is intended to provide a better understanding of our articles on security issues relating to the use of AI systems.

Even if the public models such as ChatGPT already offer a wide range of knowledge, the practical benefits can be greatly increased by using the company’s own data. For example,...

Read more...

SolutionEvaluation

How Data is Stored for use with AI Models

From Michael Veser 10.06.2024

This article explains the technical basics of generative AI systems. It is intended to provide a better understanding of our articles on security issues relating to the use of AI systems.

In the world of artificial intelligence, large language models (LLMs) are playing an increasingly central role in the processing and analysis of human language. In order to use these...

Read more...

CyberSecurity

Against the Procured Security Incident - Supply Chain Risk Management

From Bruno Blumenthal 18.03.2024

Suppliers and service providers have a significant impact on a company’s security. No organisation operates in isolation. High-profile incidents such as SolarWinds (2020) or Xplain (2023) show how significant the impact of security incidents at suppliers can be. Supply Chain Risk Management (SCRM) or Third Party Risk Management (TPRM) is therefore increasingly...

Read more...

CloudSecurity

The Special Requirements of an IoT PKI

From Michael Veser 19.06.2023

A public key infrastructure (PKI) is an important aspect of modern information security. For years, it has been the standard that all sensitive connections are encrypted. Even if you may not be aware of it, you are constantly dealing with a wide variety of PKIs! The fact that you hardly notice this in everyday life is a quality feature of well-functioning PKIs....

Read more...

SecurityArchitecture

How a Key Management System Can Help You With FADP Compliance

From Michael Veser 19.06.2023

The new Federal Act on Data Protection (FADP) comes into force on September 1, 2023 and is the talk of the town, not least because of the personal criminal liability enshrined in the law in the event of violations. Even if the revision initially seems daunting for many companies, a closer look reveals numerous overlaps with existing security frameworks.

What is...

Read more...

CloudSecurity

Network Services - Unattainably Good

From Daniel Brunner 30.09.2022

Even in times of cloud services, complexity is increasing rather than decreasing. After years of customizing software solutions, a new abstraction was sought to simplify the lifecycle of products and the change of manufacturer. As a result, there was an increased focus on standard software components and manufacturers developed their own as-a-code solutions. The...

Read more...

RiskManagement

Cyber Resilience with the ICT Minimum Standard

From Bruno Blumenthal 03.06.2022

The Federal Office for National Economic Supply (FONES) published the ICT minimum standard in 2018. This is intended as a recommendation to help companies better protect themselves against cyberattacks. The target audience of the minimum standard is primarily operators of critical infrastructures, but the standard is intended to be applicable to all organizations....

Read more...

CloudSecurity

The Challenges of Online Meetings: How To Make Your Meeting a Success

From Daniel Brunner 02.06.2022

The world has rarely been more connected than it is today: people exchange more information and there is more information for everyone and about everything. So you would think that an online meeting would be easy to organize, especially if a company has years of experience with it. However, organizing an online meeting can sometimes be difficult. Let’s take a...

Read more...

CyberSecurity

Basic Knowledge Devsecops

From Daniel Brunner 01.06.2022

DevSecOps is an extension of the existing approach of placing development and operations in a single team. DevSecOps also places security in the same team, giving it a central role.

With DevSecOps, you generally move from a world in which most services are managed centrally to a world in which services are only made available. This also strengthens the principle of...

Read more...

CyberSecurity

Identify and Protect before Detect and Response

From Bruno Blumenthal 17.01.2022

In recent years, it has been recognized that it is no longer enough to simply take preventive protective measures against cyber attacks. The detection of cyberattacks and the rapid response to attacks have increasingly come into focus, not least due to standards such as the NIST Cybersecurity Framework or the ICT minimum standard of the federal government. While it...

Read more...

IdentityFederation

The Dark Side of Collaboration Platforms

From Thomas Kessler 01.12.2021

Anyone who works with several partner companies on different collaboration platforms will be familiar with them: platform-specific logins, increasingly with 2-factor authentication that is also platform-specific.

Anyone who is responsible for a company’s Identity and Access Management (IAM) fears them: collaboration accounts that persist after the collaboration...

Read more...

PKI

The Elegance of Let's Encrypt in an Internal PKI

From André Clerc, Nishanthan Sithampary 01.12.2021

Which administrator hasn’t experienced this? An expiring TLS certificate brings down an important application and, in the worst case, paralyzes important services across the board. Error analysis proves to be difficult and time-consuming, as error messages in logs such as “Unable to connect to server” or “Service unreachable” do not say...

Read more...

StrongAuthentication

Modern Authentication - Token Exchange

From Thomas Bühler 29.06.2021

Modern authentication protocols have become indispensable in the age of the cloud and increasing cross-site collaboration. After Kerberos had set the benchmark in the on-premise world for decades, OASIS adopted SAML V1.0 in 2002, enabling standardized SSO integration of web applications for the first time. In 2005, Brad Fitzpatrick and Johannes Ernst introduced the...

Read more...

IAM

Summary of the Solarwinds Attack

From Thomas Bühler 16.03.2021

Advanced persistent threat (APT) cyberattacks, identity access management (IAM) and authentication management are topics in the field of information security that most security experts have probably dealt with at some point. But why do deficiencies in IAM and authentication management repeatedly lead to APT attacks? And why are they not detected even though existing...

Read more...

CyberSecurity

Swift CSP: What Will Change for BIC Users in 2021

From Markus Günther 16.03.2021

2021 brings two changes for SWIFT users. Firstly, the need for an Independent Self-Assessment and secondly, a new version of the Customer Security Controls Framework (CSCF) in the 2022 version. While the latter is a calculable innovation, the former is a serious tightening.

What will change for BIC users in 2021

The change from pure self-assessment to an independent,...

Read more...

StrongAuthentication

2-factor Authentication of Healthcare Professionals

From Thomas Kessler 09.03.2021

Two-factor authentication of users should become a matter of course when accessing cloud services in the healthcare sector. For this to succeed, hospitals and care homes need an electronic equivalent to an ID card.

Passwords are the Achilles heel of IT security

When logging in with a user name and password, users prove their identity by revealing a secret, namely...

Read more...

CyberSecurity

Threat Analysis of the EKANS Ransomware - How Honda had to Stop Production

From Gregor Walter 15.12.2020

In June of this year, Honda had to shut down parts of its production at various locations due to a cyberattack. The attackers exploited known security vulnerabilities to gain access to the internal network and programmed the information they obtained into the ransomware. The malware was then distributed internally and encrypted selected files on the infected PCs that...

Read more...

SecurityArchitecture

Central Authentication and Authorization Management - An Opportunity for the Future

From Thomas Bühler 12.10.2020

Nowadays, IT architects are faced with the challenge of having to meet the diverse requirements of the business department, security and regulators. The topics range from cloud integration and multi-factor login to app integration, and all of this in light of the constantly increasing need for protection, which in turn requires new approaches.

Let’s take the...

Read more...

CyberSecurity

In Our SOC We Trust: On the Importance of Trust

From Bruno Blumenthal 25.11.2019

The common blueprints for setting up a Security Operation Center (SOC) often lack an important element, namely trust in the SOC by the organization it is supposed to protect. When the inevitable critical incident occurs, this is of the utmost importance because management should be able to rely on the analyses and recommendations of its SO.

Would you like to set up a...

Read more...

ISMS

ISMS 2020 - A Tiger in Sheep's Clothing

From Daniel Felix Maurer 02.09.2019

Some people just want to run away when they read what is listed in Wikipedia under the keywords Information Security Management System and ISO/IEC 27001 and 27002. It talks about procedures and rules that need to be permanently maintained and continuously improved. What a boring thing to say! It smacks of hard work, effort and diligence - definitely not the kind of...

Read more...

CyberSecurity

How to Migrate Securely to the Cloud

From Bruno Blumenthal 20.08.2019

Security and the cloud have an extremely ambivalent relationship. Many security specialists are still skeptical about the cloud and see it primarily as a risk. However, the cloud can also be an opportunity and even be beneficial to security. The risks change with the migration of a business application to the cloud. Whether this change is negative depends on various...

Read more...

SecurityArchitecture

EPR HCP Administration: Vision Meets Reality

From Thomas Kessler 04.07.2019

The management of healthcare professionals in the national Health Provider Directory of the electronic patient dossier follows a long-term vision of the legislator. This article shows how this vision can be linked to today’s reality.

Healthcare professionals (HCPs) who wish to use the electronic patient dossier must be listed in the national Health Provider...

Read more...

StrongAuthentication

2-factor Authentication: Not Only Important for the EPR!

From Thomas Kessler 01.03.2019

The EPDG requires two-factor authentication not only for patients, but also for healthcare professionals and their assistants. This article shows how this can be implemented using the resources available in the hospital or care home.

Identity theft is one of the major problems of information security: user accounts for online services that can be accessed from the...

Read more...

PKI

Industry 4.0 (IIoT): The Advent of Cryptography

From André Clerc 11.02.2019

Digitalization in industry (Industry 4.0, IIoT) is rapidly increasing the number of connected physical devices and systems on the Internet, and experts predict that the total number of connected sensors and devices will rise to more than 50 billion by 2022. Although this opens up interesting possibilities, it also raises major concerns. Major concerns because...

Read more...

SecurityArchitecture

The Agony of Choice: Android and iOS in Corporate use

From André Clerc 18.12.2018

Mobile devices such as smartphones and tablets are playing an increasingly important role in both professional and private environments. In many companies, iOS devices from Apple are the standard - but why aren’t devices with the Android operating system also used? With over 88% market share, Android dominates the international market for mobile devices and the...

Read more...

CyberSecurity

Sourcing a SOC / CDC requires Consideration

From Daniel Felix Maurer 18.09.2018

The detection and handling of security incidents, also known as Security Information and Event Management (SIEM) or “Detection and Response” according to the NIST Cybersecurity Framework, is - unfortunately - becoming increasingly important. The Security Operations Center (SOC) or Cyber Defense Center (CDC) plays a central role in the implementation of...

Read more...

Compliance

Data Protection vs. Information Security?

From Michael Roth 30.06.2018

The issue of data protection always plays a role in the design and operation of information security - not always to the delight of business managers.

Information security consulting usually deals with topics such as cybersecurity, identity and access management or information security management systems. These areas are usually located in the client’s IT or...

Read more...

Compliance

Informational Self-Determination: How do we Deal with the Upcoming Upheaval?

From Thomas Kessler 14.05.2018

The impact of the European General Data Protection Regulation (GDPR), which can be felt by everyone, has so far been limited to the laborious confirmation of cookie policies. Behind the scenes, however, a revolution is underway that could shake the very foundations of how security managers see themselves today. This revolution is already visible in various new...

Read more...

StrongAuthentication

Death to the Password - Long Live the Password

From Adrian Bachmann 29.03.2018

The password is still alive

A few years ago, the media (see e.g. [1]) but also experts announced the death of passwords. Biometrics in all its facets (e.g. fingerprint, iris, palm veins, heart rate, voice) is just one example that was supposed to bring about its imminent death. Years later, even in the age of blockchain and cryptocurrencies, we still handle passwords...

Read more...

Compliance

Priceless: New Swift Rules for Financial Service Providers

From André Clerc 21.11.2017

Last year, hackers almost managed to pull off one of the biggest fraud cases of all time and steal almost a billion US dollars. The SWIFT network is now exerting pressure to strengthen IT security in the banking network across the board.

It was an operation that had all the makings of a thriller. In February 2016, hackers who are still unknown managed to exploit the...

Read more...

CloudSecurity

Information Security in Cloud Computing

From Thomas Kessler 07.11.2017

Cloud computing in the (medical) practice

With cloud computing (or “computing in the cloud”), IT applications or data are no longer located locally with users, but centrally with a cloud service provider. This shift of IT to the cloud has also resulted in different use cases:

  • The most widespread is data exchange via the cloud. Strictly speaking, an...

Read more...

Compliance

Information Security for the EPR Connection

From Thomas Kessler 08.09.2017

When a healthcare facility joins an EPR master community and thus the national EPR trust organization, this does not remain without consequences for the internal processes and systems. This article highlights the need for action, particularly in the area of information security.

Hospitals and care homes must join an EPR community by 2020 and 2022 respectively. They...

Read more...

CyberSecurity

Swift Arms Itself in the Fight against Cyber Attacks

From Alex Rhomberg 08.07.2017

Dr. Rhomberg, it was a hacker attack the likes of which the banking world had never seen before: In February 201, hackers managed to feed fake transfers of more than 950 million US dollars into the SWIF network at Bank Bangladesh. How could this happen?

It turned out that, on the one hand, the bank concerned had considerable deficiencies in its IT security. Secondly,...

Read more...

Compliance

The EPR as a Litmus Test for Informational Self-Determination

From Adrian Bachmann 16.08.2016

The electronic patient record (EPR) and informational self-determination are two topics that we will be hearing, reading and thinking a lot about in the coming years. Let’s talk about why the EPR is becoming a touchstone for informational self-determination.

On June 19, 2015, Parliament passed the Federal Act on the Electronic Patient Record (EPDG). When the new...

Read more...

CyberSecurity

Prevention, Detection and Response: Why Pure Prevention Is Not (or No Longer) Enough

From Adrian Bachmann 25.09.2015

Viruses, worms, Trojans, phishing, drive-by attacks and social engineering are just a small selection of the possible means of attack used by criminals to carry out profitable attacks on information systems. The professionalization of the criminal side has taken on frightening proportions. It is no longer (just) bored computer nerds in dark basements who hack systems,...

Read more...