Interviews 04.06.2021 Highly Secure in Non-Secure Networks With OPC UA Industrial networks must satisfy ever increasing requirements to meet the needs of Industry 4.0. In demand are comprehensive and
Interviews 27.10.2023 IT Security Trends "Thinking 'Who's Going to Bother Attacking Us?' Isn't Good Enough" For the November issue of the Industrial Communication Journal , Editor Bastian Fitz spoke t
Interviews 07.04.2020 The Goal is Crypto-Agility In just a few years, quantum computers could be ready for practical use. This is a risk scenario that must be taken seriously when considering current
Interviews 26.06.2018 Expert Interview: RFC 8391 – a Milestone in the Protection from Quantum Computers Collaborating on the research project squareUP, researchers from genua and the Technical Univers
Interviews 02.09.2019 Five Answers on cognitix Threat Defender In May 2019, genua acquired IT security start-up cognitix, which is now an in-house department at genua in Leipzig and is further develop
Interviews 03.12.2019 RTL2: High Performance Requirements for VPN Systems Do media companies place special requirements on IT security? And what are the current challenges? RTL2 is one of genua's long
Interviews 14.11.2019 New QuaSiModO Research Project Launched Soon quantum computers will be expected to solve highly complex computing tasks extremely quickly. They therefore already pose a threat to
Insights 30.05.2023 Post-Quantum Cryptography Watch Out, Crypto Hackers: The Gradual Progression to Quantum-Safe Cryptography With the quantum age fast approaching, the cryptographic encryption techni
Insights 09.08.2022 Quantum-Safe Cryptography Information Security in the Post-Quantum Age Recommendations for post-quantum cryptography: How to prepare your organization for future risks with solutio
Insights 01.02.2023 Data Center Interconnection With 40 Gbit/s: High-Speed Data Center Interconnect with FPGA Technology To ensure the security, high availability and redundancy of datacenters, IT sec
Insights 06.06.2023 Critical Infrastructure and IT-SiG 2.0 Three Steps toward Attack Detection According to the BSI With the German IT Security Act 2.0 (IT-SiG 2.0), both the German "Act on the German
Insights 03.01.2024 Research For a Future-Proof Cloud "Made in Germany" VerSeCloud: The Path to a Trustworthy, Secure Cloud What does a secure, trustworthy and also future-proof cloud look like? The a
Why genufix? First, about the name: At genua it is customary to prefix projects and products with a "genu". "Fix", meaning "quick" in German, stands for our open ears, our quick comprehension and fast
Insights 05.09.2023 Digital Healthcare Telematics 2.0: Privacy and Data Sovereignty in Zero Trust Architectures From: Steffen Ullrich Steffen Ullrich
Insights 24.01.2024 Cyber Security and Strategy Sovereign Clouds and IT Security: Cyber Security in the Cloud Era How can we develop trust in the security of critical digital infrastructures and sover
Highlights IDS & IPS cognitix Threat Defender Hardware variants Information material Request Hardware Comparison Compare hardware Reset < > Model cognitix Threat Defender S cognitix Threat Defender M