Skip to content
Category

Technology

10 articles in this category.

Technology

n8n + Bus Gateway: Event-Driven Automation as the Glue of the SecTepe.Comm Platform

How n8n as workflow engine plus a custom bus gateway turn the platform building blocks into real end-to-end workflows – without Zapier dependency.

Technology

Automated Malware Analysis with the CAPE Sandbox

How the CAPE sandbox integrated into SecTepe.Comm detonates suspicious attachments in Linux and Windows guests, extracts IOCs, and defeats anti-evasion techniques.

Technology

LLM-Based Phishing Classification: BEC Detection With a Local LLM in the Mail Pipeline

How a local LLM (Ollama) catches phishing and business-email-compromise messages that survive classical filters – GDPR-compliant and without a cloud API.

Technology

AI-Supported Compliance: Policy Generation, RAG Audit Assistant, and STRIDE Threat Modelling

Where AI really delivers value in compliance and ISMS workflows – policy generation, retrieval-augmented audit assistant, STRIDE threat modelling – and where it doesn't.

Technology

AI: Blessing or Curse for IT Security?

Artificial intelligence is revolutionizing cybersecurity - both as a tool for defenders and attackers. An analysis of opportunities and risks.

Technology

Deepfake Detection Made Easy: How to Spot Manipulations

The tongue as a surprising detection feature: why realistic tongue movements remain a real challenge for deepfake algorithms.

Technology

An Overview of Cyber Security as a Service (CSaaS)

CSaaS is an outsourcing model for cybersecurity that provides organizations with access to expert knowledge and advanced technology for comprehensive protection.

Technology

AI and Big Data: Data Protection Strategies

How AI and big data impact data protection and which strategies are decisive for IT security and privacy in the digital era.

Technology

AI-Generated Videos: The Future of Information Security

AI-generated videos revolutionize information security through increased efficiency, personalization, and realistic training content.

Technology

Endpoint Detection and Response – SecTepe & CrowdStrike

EDR is an essential component of modern cybersecurity strategies for early detection and response to threats in networked systems.