Author: DICC Institute

15 August 2020

Stock Market Analysis of Microsoft

Microsoft is the 3rd largest company in the world in terms of market capitalization with $ 1,536 billion (as of July 23, 2020). It has revenue of $ 143.02 billion and net income of $ 44.28 billion for its fiscal year ended June 30, 2020. Microsoft is by far the global operating software giant and IT services. However, is Microsoft’s share a value in which […]

13 August 2020

Email Security Tips

New types of malware and increasingly sophisticated attack mechanisms by cybercriminals keep making headlines. For example, security experts are currently warning against fileless malware . The malicious code is not permanently saved on the affected system. Instead, it is reloaded in the working memory. There is no permanent copy on the end device. Common antivirus programs usually do not recognize this type of malware. Even if a company only allows explicitly approved […]

18 July 2020

How to Secure Smart Cities Future

The future of the world’s population is urban. In 2050, about two thirds of the people will live in urban areas – especially in Asia and Africa, urbanization will be rapidly promoted. In plain language, this means that an additional 2.5 billion people are expected to live in our cities in the next three decades. In addition to the procurement of the necessary living space, […]

18 July 2020

How to Use Bollinger Bands in Stock Market

What are Bollinger Bands? Discover one of the most used indicators for the graphical study of stock market prices. Highlighted by John Bollinger in the early 1980s, it is probably the best known and most widely used volatility indicator in technical analysis. The current popularity of this indicator is first of all due to the ease with which it makes it possible to assess the […]

1 July 2020

Cloud Security Challenges

I recently sat down for a couch talk with our product marketing manager Yitzy Tannenbaum. We wanted to share my experience of working with hundreds of companies worldwide and in different industries, and talk about how their security approaches can be compared and contrasted at the same time. Together we discussed the changes I see in corporate security and how different organizations manage security differently in their […]

26 June 2020

Security challenges for new technologies

New technologies expand corporate structures rapidly but at the same time also examine the security experts with new tasks. In this context, a current study primarily mentions data security as a hurdle. It is difficult to clearly determine the beginning and end of digital transformation in companies. Organizations have to adapt to the pace of digitization and the associated changing threat situation. Innovations should be implemented continuously to […]

10 June 2020

Digitization of B2B Sales

Many industrial suppliers continue to process orders by email and phone. Not only do they miss the signs of the times, they also leave behind sales and cost savings that come with digital order and processing management. With a fully digitized supply chain, the degree of automation and efficiency in companies increase. E-commerce has been established in B2C for years. Many companies make a large part of their […]

9 June 2020

How to Correct User Behavior in times of Hacking attacks

Data leaks occur more and more frequently. One of the most serious leaks recently came from a hack, causing private information, including letters, chat histories, and even credit card information, to leak to the public. Users should therefore take a few tips to ensure that their and your company’s information will not become part of the next data scandal. Also Read: Awareness-building through live hacking making cyber […]

5 June 2020

How to Invest in Oil Stock Market

What is the value of oil? How does the price of oil vary? What is the cause of the current fall in oil prices and what will be the consequences? Should we invest in oil in this context? What are the different ways to invest in oil? Also find our comparison of stock brokers to position yourself on this very specific raw material. Explanations and advice for investing in oil […]

3 June 2020

Awareness-building through live hacking making cyber risks tangible

Despite numerous press reports on security incidents, the risk of cyberattacks often remains very abstract. Live demonstrations of typical hacker attacks show how criminals act and how easily they can often penetrate systems. In this way, they create awareness and make cyber risks tangible. Successful hacker attacks can have significant consequences, as numerous prominent examples show. Most readers will still remember the successful ransomware attack by the extortion […]