Search
Sovereignty assessment check
Four approaches, one question: How sovereign is your IT really? We compare the digital sovereignty tools from Red Hat, SUSE, Deloitte, and Nextcloud and show what really matters when it comes to digital sovereignty.
Quantum computer
Quantum computers will fundamentally change the way we look at humanity’s most complex problems. They promise new insights, from materials science to medicine and climate research. However, this future technology is also challenging established standards in cyber security.
Ad
Data security
Comprehensive and correct classification is fundamental for data security. Only if you know which data is (particularly) worth protecting can you implement appropriate measures. This is all the more important in times of AI assistants such as Microsoft Copilot.
Ad
PDF Pro and Help PDF
Many people use free online services to create PDFs quickly and easily. A recent study by the Cybernews research team reveals that this convenience can come at a high price: the security of personal data.
Ad
17.03.2026
 - 18.03.2026
Hamburg
18.03.2026
 - 19.03.2026
Berlin
21.04.2026
 - 22.04.2026
Nürnberg
Ad

Most Read Articles

Ad
Ad
Ad