Myra
Knowledge Hub
Cloud, Big Data, AI, Cyber Security and more: In the Knowledge Hub of Myra Security you will find interesting facts about the most exciting topics of our digitalized society – presented in an understandable and informative way.


Data protection & Compliance
- IT security & outsourced activities and processes according to MaRisk AT 9 ➔
- IT security as outsourcing according to MaGo and section 32 VAG ➔
- What is Business Continuity Management (BCM)? ➔
- What is encryption? ➔
- ISO 27001 vs. ISO 27001 based on IT-Grundschutz ➔
- What is DORA (Digital Operational Resilience Act)? ➔

Threats
- What are hype sales bots? ➔
- What is cart abandonment? ➔
- What is Skewing ➔
- What is Web Scraping? ➔
- What is SQL-Injection? ➔
- What is cross-site scripting? ➔
- What is credential stuffing? ➔
- What is credential cracking? ➔
- What is a brute-force attack? ➔
- What is Form Spam ➔
- What is malware? ➔
- What is DNS cache poisoning? ➔
- What is DNS Spoofing? ➔
- What is a cyber attack? ➔
- What is behind Social Engineering? ➔
- What is a hacker? ➔
- What is whaling? ➔