Pen and notebook on a desk

adesso Blog

46
AI

We live in a time in which digital networking is constantly increasing and at the same time the number of cyber attacks is rising rapidly. These attacks are becoming increasingly sophisticated and represent a considerable burden for both companies and government organisations. This blog post shows how AI is being used in cybersecurity both as a tool for attackers and as a means of defence.

Read more
Methodology

In a distributed software system, data changes always pose a challenge. How is it possible to track the change history of data located in one part of the system in order to synchronise connected data stores in other subsystems? Change Data Capture (CDC) offers an answer to this question. I explain what this is all about in this blog post.

Read more
Methodology

Interactive formats are an effective alternative to conventional conferences as they encourage dialogue between participants. Large group facilitation is a socio-psychological method for communicating and making decisions effectively in large groups. This blog post presents common methods of large group facilitation and explains how they can be used successfully.

Read more
Industries

Hydrogen has the potential to play a key role in the European energy transition. In addition to technological advances in the field of hydrogen production, storage and application, digitalisation also plays a decisive role in the development of this industry. This blog post explains the digitalisation potential and fields of application behind this in more detail.

Read more
Methodology

NIS 2 can seem like an invincible giant in many ways to an organisation that must be compliant by 18/10/2024 and has not been regulated until now. Of course, the world of cyber threats continues to turn in parallel with the urgent implementation of the directive, and even seems to be heading inexorably towards us, and unfortunately, thanks to GenAI, ever faster. Microsoft offers a wide range of products that address the NIS 2 Principles. In this blog post, I explain what these are, what advantages they offer and what specifically needs to be done.

Read more
Industries

Customer identity and access management is used to control a user's digital access and manage their data. As a rule, the main focus here is on regulatory aspects. In my blog post, I would like to show you that it is also worthwhile for insurance companies to deal with this topic in terms of the user experience.

Read more

Save this page. Remove this page.