Move Google Authenticator to a new phone
How to transfer Google Authenticator to a new phone
  • Security

Secured your Google account with the Google Authenticator app and now want to switch phones? No problem. You can simply move the app or account link. Read on to find out how to transfer Google Authenticator to your new phone and what you need to consider when moving to a new number or keeping your existing one.

How to transfer Google Authenticator to a new phone
RAID 10
What is RAID 10?
  • Security

RAIDs are a good solution for improving the performance of hard drives. The individual standardized levels provide different approaches to boost reliability or the throughput rate of system networks. RAID 10 relies on complete data redundancy. Data is stored in a distributed manner and can be read quickly. Find out what’s behind the RAID level!

What is RAID 10?
What is SIEM?
What is SIEM? (Security Information and Event Management)
  • Security

Security gaps in IT infrastructure can risk a company’s reputation or even threaten its survival. Where criminals manage to shut down company networks or gain access to sensitive data, financial and image-related damage becomes a certainty. SIEM (Security Information and Event Management) allows businesses to detect danger in real-time, allowing for appropriate and timely reactions.

What is SIEM? (Security Information and Event Management)
OAuth
OAuth (Open Authorization)
  • Security

The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorization. But how exactly does OAuth2 work and...

OAuth (Open Authorization)
What is a rootkit?
What is a Rootkit?
  • Security

If you ask the IT community which malware is the most harmful, the answer is typically not viruses, worms or Trojan horses. Experts unanimously agree that rootkits pose much greater problems even to experienced users. The rootkit’s special ability is to conceal other malware and thereby enable cybercriminals to misuse others’ computers for their own criminal activities undetected – such as for bot...

What is a Rootkit?
SAML
What is SAML?
  • Security

Simplifying log-in processes makes websites more user friendly, and also helps to increase the security of user data. One of the most popular solutions for implementing authentication processes is SAML (security assertion markup language). Through a variety of components such as special protocols and message formats, this XML-based framework helps to implement internal and cross-company log-on...

What is SAML?
What is cybersecurity? The current dangers
What is Cybersecurity?
  • Security

More and more dangers are creeping into the digital world. So it is no surprise that the issue of cybersecurity is gaining more and more weight and is taking a leading role in the fight against cybercrime. But how can you protect yourself from dangers on the network? And what is the current state in the US? We provide you with an overview of this. 

What is Cybersecurity?
What is a backup?
What is a Backup?
  • Security

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimize the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

What is a Backup?
Set up Google Authenticator
How to set up Google Authenticator
  • Security

Whether emails or online banking, two-factor authentication has become a security standard when accessing user accounts online. Entering a password alone is no longer sufficient to log in. To secure your Google account, the Internet giant provides its own Google Authenticator app, which generates a unique code every time you log in. Read on to find out how to set it up.

How to set up Google Authenticator
What is DevSecOps?
What is DevSecOps?
  • Security

DevSecOps is the optimal approach for achieving faster software development, without having to make any cutbacks to security. Security packages are directly integrated into the development process. We’ll explain its pros and cons and clarify the various possibilities for using the system.

What is DevSecOps?