Technology
10 articles in this category.
n8n + Bus Gateway: Event-Driven Automation as the Glue of the SecTepe.Comm Platform
How n8n as workflow engine plus a custom bus gateway turn the platform building blocks into real end-to-end workflows – without Zapier dependency.
Automated Malware Analysis with the CAPE Sandbox
How the CAPE sandbox integrated into SecTepe.Comm detonates suspicious attachments in Linux and Windows guests, extracts IOCs, and defeats anti-evasion techniques.
LLM-Based Phishing Classification: BEC Detection With a Local LLM in the Mail Pipeline
How a local LLM (Ollama) catches phishing and business-email-compromise messages that survive classical filters – GDPR-compliant and without a cloud API.
AI-Supported Compliance: Policy Generation, RAG Audit Assistant, and STRIDE Threat Modelling
Where AI really delivers value in compliance and ISMS workflows – policy generation, retrieval-augmented audit assistant, STRIDE threat modelling – and where it doesn't.
AI: Blessing or Curse for IT Security?
Artificial intelligence is revolutionizing cybersecurity - both as a tool for defenders and attackers. An analysis of opportunities and risks.
Deepfake Detection Made Easy: How to Spot Manipulations
The tongue as a surprising detection feature: why realistic tongue movements remain a real challenge for deepfake algorithms.
An Overview of Cyber Security as a Service (CSaaS)
CSaaS is an outsourcing model for cybersecurity that provides organizations with access to expert knowledge and advanced technology for comprehensive protection.
AI and Big Data: Data Protection Strategies
How AI and big data impact data protection and which strategies are decisive for IT security and privacy in the digital era.
AI-Generated Videos: The Future of Information Security
AI-generated videos revolutionize information security through increased efficiency, personalization, and realistic training content.
Endpoint Detection and Response – SecTepe & CrowdStrike
EDR is an essential component of modern cybersecurity strategies for early detection and response to threats in networked systems.