You are here:
Authentication and authorization are critical components of any application. Various standards and frameworks have been developed to facilitate the…
Young professionals, industry and business network at Career Day "Engineering & Computer Science".
How do social engineering attacks work? In «Beobachter», the Swiss magazine for law and justice, Ivano Somaini talks about his unusual everyday life…
In this 3-day hands-on seminar (in German) you will learn about internal network attacks and how you can protect your systems from them.
Christian Feuchter identified a vulnerability in BeyondTrust Privileged Remote Access (PRA).