By Sebastian Spicker, Managing Director DACH at IFS Many companies have invested heavily in digitalisation in recent years. While new platforms and AI solutions promise enormous potential in terms of productivity, efficiency and flexibility, quite a few companies are...
Introduction of Verification of Payee (VoP): An important step, but not a magic solution to fraud
A commentary by Dirk Mayer, Head of Anti-Fraud Consultants at RISK IDENT The introduction of Verification of Payee (VoP) as part of the EU Instant Payments Regulation is a welcome and long-overdue step towards greater payment security in the SEPA area. Comparing the...
RecoveryLab Berlin completely recovers iPhone data after severe water damage
Forensic chip analysis enables iPhone data recovery despite corroded electronics After suffering massive liquid damage, a Berlin family lost access to all the data on their iPhone – including several thousand photos, videos and personal messages. The device no longer...
Shai-Hulud and the new vulnerability of supply chains: Why cybersecurity must extend beyond your own IT
by Peter Machat, Senior Director EMEA Central at Armis Supply chains: Why cybersecurity must extend beyond your own IT Recent attacks on software supply chains show how vulnerable and intertwined digital infrastructure has become. The incident involving the Shai-Hulud...
Raynet recognised in ‘The Endpoint Management Platforms Landscape, Q3 2025’ report
Forrester: The Endpoint Management Platforms Landscape, Q3 2025 Raynet, a global software manufacturer with market-leading solutions and a specialist in true IT asset visibility, is proud to have been included as a vendor in Forrester's ‘The Endpoint Management...
The domino effect: Why the Jaguar Land Rover attack exposes the failure of isolated cybersecurity
A commentary by Gerald Eid, Regional Managing Director EMEA at Getronics The cyberattack on Jaguar Land Rover is more than just another headline. The estimated damage is nearly £2 billion, with over 5,000 organisations affected. According to the Cyber Monitoring...
AI prompt manipulation opens Pandora’s box
Why the new attack method is forcing companies to rethink their approach to cyber security Artificial intelligence (AI) is currently transforming the digital world of work at a pace that challenges even experienced IT security managers. Systems that were previously...
AWS outages show: Digital value creation remains vulnerable
Retarus CEO urges review of cloud strategies The current global service problems at Amazon Web Services (AWS) have once again shown how vulnerable digital value chains can become when central cloud providers fail. Numerous companies worldwide were affected – and are...
AI versus AI: Microsoft warns of new wave of phishing attacks
Cybercriminals are increasingly turning to artificial intelligence (AI) to perfect their phishing attacks. A recent report by Microsoft shows how attackers are using the same technologies as security researchers – but with the opposite objective. The campaign observed...
McDonald’s Austria – Stability and speed with edge IT solutions from Rittal
Digital processes at the touch of a button: How McDonald’s guarantees reliability in every branch with edge data centres In McDonald’s Austrian restaurants, hardly anything works without IT. From self-service terminals and mobile orders to cashless payments – the...



