Information Security

Focus on security: a closer look at the Brainloop security concept

Brainloop's solutions enable you to collaborate efficiently and securely. With software development at Brainloop, security is always the highest priority – whether you need to protect everyday busines

IP management: protect your trade secrets and intellectual property

Data theft, hacker attacks, viruses and trojans – cyber-attacks have been increasing for years now and have become a familiar phenomenon in our society. But although attacks are getting more frequent

Cryptic messages: an ABC of encryption

There have always been secrets. And people have been trying to protect their intellectual property from prying eyes for almost as long. For example, the Roman general Julius Caesar used a code for hi

Software design: the importance of microservices and agility

When a company wants to develop software, the choice of the right architecture is just as decisive for the project’s success as the definition of concrete requirements. In a similar way to a blueprin

Under lock and key: securing communication processes in law firms

A daily stream of sensitive documents flows through every law firm and legal department. Matter-related documents, transaction and deal bibles, due diligence reports, board and partner meeting packs

The value of data: cyber-criminals have companies in their sights

Around the world, companies are making big investments in digitalising their customer touchpoints, internal processes and IT infrastructure. They know that digital processes make their work faster as

The role of the CISO: a key function

According to a study by Germany’s digital trade association Bitkom, one in three companies has already been a victim of data theft. No wonder there’s such strong demand for security experts – especial

What happens when an internal audit uncovers explosive information

It’s easy in theory. Companies – like the rest of us – must obey the law. Especially when it comes to checking their business processes and ensuring they’re always compliant with regulatory requiremen

Quick guide: What the EU Trade Secrets Directive means for you

The EU directive that protects companies’ confidential expertise has been binding for EU firms since 9 June 2018. It was mainly implemented to provide a consistent definition of the term ‘trade secret

Cyberattacks are one of the top 5 global risks

At the World Economic Forum (WEF) last month in Davos, it was remarkable how many IT-related events were on the conference programme. Prominent representatives of well-known companies, organisations a

Topics

No categories found