Avatar photo

About Stefan

This author has not yet filled in any details.
So far Stefan has created 8 blog entries.

five(9)s Console 5.0 Release

🚀 five(9)s Console 5.0 – New tools for more overview and control With the new version 5.0 of the five(9)s Console, we are once again delivering a substantial package of improvements - this time with a clear focus on transparency, control, user-friendliness and security in endpoint management. Here is an [...]

2025-04-01T08:15:49+00:0031. March 2025|Knowledge|0 Comments

CROWDSTRIKE & BSOD – EXPERIENCE REPORT

Events such as the CrowdStrike breach, a poor security patch or even the failure of a cloud system can suddenly turn into a real disaster for your company. That's why disaster recovery processes, reliable systems and well-trained employees are important. We spoke to an employee of an affected customer to [...]

2025-04-08T14:31:12+00:0026. August 2024|Ivanti|0 Comments

MSI Data Breach – how the hack threatens us and what we should do

This morning the headline "MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web" shocked me a bit. However, it's not so much the fact that something like this is happening that worries me, but rather that many customers are not adequately protected. Often, the safety net that [...]

2023-06-29T08:50:59+00:009. May 2023|Knowledge|0 Comments

The danger of using PowerShell

Microsoft's PowerShell is becoming increasingly important for companies. It is often used to manage and configure the Microsoft Azure Cloud or to automate IT processes in the company. Almost every IT administrator has already written one or more PowerShell scripts that are in productive use. However, it is all [...]

2023-06-06T11:56:23+00:002. May 2023|Knowledge|0 Comments
Go to Top