Information Security

Focus on security: a closer look at the Brainloop security concept

Brainloop’s solutions enable you to collaborate efficiently and securely. With software development at Brainloop, security is always the highest priority – whether you need to…

IP management: protect your trade secrets and intellectual property

Data theft, hacker attacks, viruses and trojans – cyber-attacks have been increasing for years now and have become a familiar phenomenon in our society. But…

Cryptic messages: an ABC of encryption

There have always been secrets. And people have been trying to protect their intellectual property from prying eyes for almost as long. For example, the…

Software design: the importance of microservices and agility

When a company wants to develop software, the choice of the right architecture is just as decisive for the project’s success as the definition of…

Under lock and key: securing communication processes in law firms

A daily stream of sensitive documents flows through every law firm and legal department. Matter-related documents, transaction and deal bibles, due diligence reports, board and…

The value of data: cyber-criminals have companies in their sights

Around the world, companies are making big investments in digitalising their customer touchpoints, internal processes and IT infrastructure. They know that digital processes make their…

The role of the CISO: a key function

According to a study by Germany’s digital trade association Bitkom, one in three companies has already been a victim of data theft. No wonder there’s…

What happens when an internal audit uncovers explosive information

It’s easy in theory. Companies – like the rest of us – must obey the law. Especially when it comes to checking their business processes…

Quick guide: What the EU Trade Secrets Directive means for you

The EU directive that protects companies’ confidential expertise has been binding for EU firms since 9 June 2018. It was mainly implemented to provide a…

Cyberattacks are one of the top 5 global risks

At the World Economic Forum (WEF) last month in Davos, it was remarkable how many IT-related events were on the conference programme. Prominent representatives of well-known…