Blog

Blog

Why compliance is a must-have in 2022

Why compliance is a must-have in 2022

Compliance is no longer just a buzzword
Read more
Trust is good, control is better

Trust is good, control is better

How to prevent hackers from infiltrating a company.
Read more
QUANTUM cyber lab gears up for the future

QUANTUM cyber lab gears up for the future

Thomas Poschen succeeds Robert Ehlert
Read more
What if all data is gone

What if all data is gone

The art in data recovery
Read more
How SOCs can help SMBs

How SOCs can help SMBs

Die Cyberangriffe auf kleine Firmen nehmen stetig zu
Read more
How to behave in the event of a cyber attack

How to behave in the event of a cyber attack

How to behave correctly as an employee in the event of a cyber attack
Read more
Crypto Trojan

Crypto Trojan

The Virus Trend 2022
Read more
Locked out: what's happening on YouTube right now

Locked out: what's happening on YouTube right now

Several content creators fall victim to hackers
Read more
When an employee becomes a threat

When an employee becomes a threat

Inside perpetrators are increasingly becoming a threat to companies
Read more
An overview of the new whistleblowing directive

An overview of the new whistleblowing directive

What the new directive means for companies and cyber security service providers
Read more
International Day of Care

International Day of Care

In times of Corona, the topic of IT security for hospitals has become even more of a focus
Read more
Case Study: Automotive

Case Study: Automotive

How a disgruntled employee ruthlessly tried to harm his former company
Read more
The human factor

The human factor

Lessons learned from the first day of the SOC Summit
Read more
A word with... Edith Krüger

A word with... Edith Krüger

Attorney, data protection officer, supervisory board chairwoman Edith Krüger fights on many fronts and knows the dangers to data.
Read more
May we introduce, SOCWISE!

May we introduce, SOCWISE!

QUANTUM cyber lab AG and the Hungarian SOC service provider enter a joint partnership.
Read more
How to secure your data in online commerce

How to secure your data in online commerce

Holidays are not celebrations for family, but also for data thieves
Read more
The History of Cyber Security 2000-now

The History of Cyber Security 2000-now

In this blog, we cover the biggest threats in info security from 2000 to today. Learn more about Ransomware, WannaCry and many other threats.
Read more
The History of Cyber Security 1987-1999

The History of Cyber Security 1987-1999

The new era of computer viruses, worms and malware created a need for protection that led to the development of commercial antivirus software.
Read more
The History of Cyber Security 1970-1986

The History of Cyber Security 1970-1986

This is a blog about the world of hacking and computer security, Kevin Mitnick, how cyber attacks are planned and executed, Trojans, Cold War espionage, and more.
Read more
The History of Cyber Security 1940-1970

The History of Cyber Security 1940-1970

The Origins of Cyber Security: von Neumann; Phreaking; ARPANET; Steve Wozniak & Steve Jobs; Creeper & Reaper.
Read more
How IT forensics becomes a powerful compliance tool

How IT forensics becomes a powerful compliance tool

Imagine a highly responsible role becomes available in your company - a long-time colleague applies for the job. In the last few meters, an external competitor wins the race due to his experience in the position in demand and is hired as the internal competitor's direct supervisor. How does the competitor react? He quits. And joins the competition.
Read more
Dell Bios: Multiple vulnerabilities in systems

Dell Bios: Multiple vulnerabilities in systems

Both Dell and the BSI warn of vulnerabilities in some Dell systems that make it easier for attackers to penetrate and damage the system. This vulnerability affects both private and business customers. What to do now?
Read more
Digital forensics

Digital forensics

75% of German companies are affected by cyber attacks - and each incident costs an average of 4.25 million euros. Such consequences are particularly fatal for small and medium-sized companies.
QUANTUM cyber lab AG not only supports you preventively in the fight against criminal hackers - we also help during an incident.
Read more
Red Teaming

Red Teaming

Cyber attacks on German companies are increasing: According to a study by the digital association Bitkom, 7 out of 10 industrial companies in Germany have already been victims of sabotage, data theft or espionage. The losses to the economy amount to 43.3 billion euros.
Read more