Skip to content
Services
Security Advisory
Business Continuity Management
Compliance Management
Data Privacy
Information Security Consulting
Information Security Management System (ISMS)
CISO as a Service
Security Awareness
Assessments
Exposure Assessment
NIS2-Assessment
NIS2 for Microsoft
Cyber Defense
Exposure Management
Vulnerability Management
Attack Path Management
Pentesting / PTaaS
Exposure Assessment
Cyber Threat Intelligence
Monitor, Detect & Response
SIEM
Security Operations Center
MXDR
CSIRT
Data Encryption &
Key Management
Applied Crypto
Public Key Infrastructure
Signing Services
Application & Data Security
File Folder Encryption
Cloud Platform Security
Cloud Platform Security
Cloud Security & Compliance
Cloud Data Security
Migration & Transformation Services
Network & Endpoint Security
Workload and Network Security
Zero Trust Network Access
Next Gen Firewall Management
Network Security & Solutions
SASE
Workload Security
IAM
IAM
Access Management
Identity Governance & Administration
Privileged Access Management
PAM as a Service
All Services
Solutions
Microsoft
Microsoft Identity & Access Management Modernization
Microsoft Cyberthreat Protection
Secure Modern Workplace
Microsoft Cloud Platform Transformation
Microsoft Cloud Compliance & Data Security
NIS2
NIS2 Assessment
NIS2 for Microsoft
About us
About us
Career
Partner
Media Center
Media Center
Blog
Events & Webinars
News
Resources
Request consultation
Global (english)
Germany (german)
Switzerland (german)
Fighting AI attacks: How to protect data and systems
Social engineering is as old as mankind – and still works remarkably well: this type of attack is based on gaining trust and getting the victim to do things they shouldn’t actually do: For example, revealing passwords or other sensitive information. Attackers are increasingly turning to so-called deepfakes.
Read article
Nothing Found
It seems we can’t find what you’re looking for. Perhaps searching can help.
Search for: