centron Tech Blog:
Latest Trends and Expert Insights from the Tech World
Get all the latest news of the tech industry, guides and nice-to-knows. Use these trends, insights and expert knowledge all about cloud computing and tech in general to your advantage.
Overview: The 10 most important tech trends
Overview: The 10 most important tech trends What are the most important tech trends for the next few years? We provide an overview based on Gartner’s 10 most important strategic…
Processor market: AMD is growing again
Processor market: AMD is growing again The CPU market experienced its biggest downturn on record last year. AMD emerged as the big winner: The manufacturer was able to increase its…
Lobbyleaks: Portal to report shady lobbying
Lobbyleaks: Portal to report shady lobbying LobbyControl and Corporate Europe Observatory have founded the online portal Lobbyleaks. MEPs and their employees can use the website to report questionable lobbying activities…
VMWare ESXi: Attacks on 2 year old gap
VMWare ESXi: Attacks on 2 year old gap A vulnerability in VMWare ESXi that was fixed in early 2021 is now under active attack. Companies that didn’t bother to apply…
Yandex: Millions of people are at risk of data abuse
Yandex: Millions of people at risk of data abuse User data from the Russian search giant Yandex has been abused on the Internet. As a result, millions of people are…
IT resilience: acting instead of reacting
IT resilience: acting instead of reacting Many companies only react when their IT is actively attacked. It makes more sense to secure core systems and applications in advance with robust…
Balancing data protection, cloud and AI
Bring data protection, cloud and AI into harmony Balancing data protection, cloud and AI – AI and cloud need each other to evolve. This interaction is currently still being hampered…
Cyber attacks on organizations continue to increase
Cyber attacks on organizations continue to increase In 2022, 27 percent more cyber attacks were carried out on organizations across Germany than in the previous year. The Security Report 2022…
Zero-Click Attacks: Minimize Risk
Zero-Click Attacks: Minimize Risk Many cyber attacks are dependent on the actions of their victims – but there are now also methods that reach their target without any action on…