El blog de la EnBITCon
Filtro
Sophos Endpoint 100: Enterprise-Sicherheit für den Mittelstand – ohne Kompromisse
Ransomware-Schutz, KI-gestützte Abwehr und Deep Learning sind heute kein Luxus mehr, sondern für jedes Unternehmen überlebens...
enbitcon-theme.blog.release_label 23 de enero de 2026
Sophos
IT-Security, Sophos, Antivirus
Who is TEHTRIS — and what does the company do?
TEHTRIS is a European cybersecurity provider focused on detection, containment, and response to attacks in real time...
enbitcon-theme.blog.release_label 16 de enero de 2026
TEHTRIS
Sicherheitsrisiken, Cybersecurity
What Is SonicWall? Next-Gen Network Security, Simply Explained
SonicWall is a provider of network security solutions—from Next-Generation Firewalls (NGFW) and secure remote access...
enbitcon-theme.blog.release_label 9 de enero de 2026
SonicWall
Cybersecurity, SonicWall
Happy New Year! 🎉 – And stay safe: Why more attacks occur around the turn of the year
We wish you a successful, healthy, and relaxed New Year! To kick things off, here’s an important insight from real-wo...
enbitcon-theme.blog.release_label 2 de enero de 2026
Por nuestra cuenta
Sicherheitsrisiken, Schwachstellen
Email Security 2026: DMARC Enforcement, BEC & Deepfake Impersonation
Email remains the backbone of business communication—and the #1 entry point for attacks. In 2026, major providers wil...
enbitcon-theme.blog.release_label 26 de diciembre de 2025
Por nuestra cuenta
Cybersecurity, E-Mail
Fail Friday: Autocomplete Facepalm & The Zoom Link That Never Dies
Welcome to our Fail Friday! In Fail Friday, we share anonymized slip-ups from everyday IT—with a wink and a clear les...
enbitcon-theme.blog.release_label 19 de diciembre de 2025
Por nuestra cuenta
Sicherheitsrisiken, Schwachstellen
SonicOS 7 – Wie Firewalls echte Business-Enabler werden
Moderne Firewalls sind weit mehr als Schutzmechanismen. In vielen Unternehmen übernehmen sie heute zentrale Rollen im...
enbitcon-theme.blog.release_label 12 de diciembre de 2025
SonicWall
SonicWall, IT-Security, Management, Firewall
Wi-Fi Backscatter: What’s behind it — and how to realistically assess the risk
“I’m not even connected to the Wi-Fi…” — that’s no longer something you can rely on. With Wi-Fi backscatter, it is th...
enbitcon-theme.blog.release_label 5 de diciembre de 2025
Por nuestra cuenta
Sicherheitsrisiken, Cybersecurity
QRishing (Quishing): When QR Codes Become a Phishing Trap
QR codes are everywhere: on parcels, parking meters, posters, invoices, access cards. That’s exactly what makes them...
enbitcon-theme.blog.release_label 28 de noviembre de 2025
Por nuestra cuenta
Sicherheitsrisiken, Cybersecurity, Tipps