Home »
Der Podcast für IT-Sicherheit
Bleiben Sie auf dem Laufenden.
Skytale – der IT-Sicherheit-Podcast mit Akademieleiter Max Ziegler. Hier erhalten Sie Informationen aus erster Hand über aktuelle Gefahren, Bedrohungen, Angriffe und Betrugsversuche, die auf Unternehmen einwirken.
Neueste Podcasts
![BERLIN, GERMANY - Mar 16, 2021: A Smartphone with the new developed Luca Corona App opened. BERLIN, GERMANY - Mar 16, 2021: Smartphone with the new developed Luca Corona App opened. The app was built in the fight against covid-19 pandemic. private meeting.](https://skytale.academy/wp-content/uploads/bb-plugin/cache/AdobeStock_421541495_Editorial_Use_Only-1024x683-landscape-248585e19d6d1b8827ecf7afb872a9c1-.jpeg)
Podcast 18: Luca-App, Hackerangriffe auf die Impfstoff-Kühlkette, Phishing-Angriffe auf Bankkunden, IoT in Unternehmen
![AdobeStock_283536684 AdobeStock_283536684](https://skytale.academy/wp-content/uploads/bb-plugin/cache/AdobeStock_283536684-2-1024x592-landscape-f48ed7b7c1810cecf80c485e506da4bc-.jpeg)
Podcast 16: Aktuelle IT-Hacks, Pannen und Sicherheitslücken – Mobile Security, Healthcare und Corona, Exchange-Hack
![A computer popup box screen warning of a system being hacked, compromised software environment. 3D illustration. A computer popup box screen warning of a system being hacked, compromised software enviroment. 3D illustration.](https://skytale.academy/wp-content/uploads/bb-plugin/cache/AdobeStock_263959295-1024x705-landscape-a291ffadc7e67f1dc53e30f4a2f13a9e-.jpeg)
Aktuelle IT-Hacks, Pannen und Sicherheitslücken (Teil 8: Microsoft Exchange Server Hack, FritzBox-Attacke, infizierte Apps und Router als Wachleute)
![Dark shadow of a hand reaches for computer keyboard symbolizing cyber crime Dark shadow of a hand reaches for computer keyboard symbolizing cyber crime](https://skytale.academy/wp-content/uploads/bb-plugin/cache/AdobeStock_275222167-1024x683-landscape-91816fc71a39d7eabe4b8b87b8ffc9f1-.jpeg)
Aktuelle IT-Hacks, Pannen und Sicherheitslücken (Teil 7: SSD sicher löschen, Phishing, E-Roller und Schatten-IT)
![The concept of credit card theft. Hackers with credit cards on laptops use these data for unauthorized shopping. Unauthorized payments from credit card owners. In the hacker's secret office The concept of credit card theft. Hackers with credit cards on laptops use these data for unauthorized shopping. Unauthorized payments from credit card owners. In the hacker's secret office](https://skytale.academy/wp-content/uploads/bb-plugin/cache/AdobeStock_263983562-1024x683-landscape-5753fcdff6751202d9d6c9050ce0bd15-.jpeg)