Modern dark workspace features open laptop with glowing red keyboard on black desk. Smartphone shows red lights, next to closed device. Minimalist home office scene tech gadgets plant near window.
Blog article
|IT Security
The invisible attack surface: Why traditional cybersecurity falls short
You can't protect what you can't see. And the harsh truth is that most companies only see a fraction of what's happening on their network. In the age of the modern workplace—laptops, smartphones, remote workstations, modern work tools, cloud services,…
Blog article
|IT Security
Interview with Markus Adolph: Cyber resilience starts with people
In a digital world where cyberattacks have become a daily threat, cyber resilience is a key factor for business success. But true security does not come from technology alone—it requires people. Markus Adolph provides insights into EBF's security culture and…
E-book
|IT Security
E-book: The EBF Security Compass – With all our knowledge
Our IT security compass offers practical insights and strategies for greater cyber resilience—through strategic measures, modern security technologies, and employee awareness.
Blog article
|IT Security
Interview: How safe are we really?
The threat scenarios surrounding the digital workplace often sound like something out of a crime novel: attackers encrypt data and demand large sums of money. They skillfully extract sensitive information over the phone or use artificial intelligence and deepfake videos…
E-book
|IT Security
E-book: VPN 2.0 – The possibilities of virtual private networks
Find out what abbreviations such as VPN gateway, site-to-site VPN, per-app VPN, and split tunneling mean in our e-book.
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.