CCNet Blog

IT Security, Tecnology Trends, Data Protection and Compliance in depth

Practical check: Audits in the supply chain

Practical check: Audits in the supply chain

Management Summary Those who do not assess their partners outsource third-party risks—straight onto their own balance sheet. The way forward is not a monster project but a well-designed staged model for audits: start small, deepen based on risk, translate results into KPIs, and consistently follow up. The goal is ...

CCNet

CCNet

Feb 9, 2026   •  3 min read

Software supply chains The silent gateway

Software supply chains The silent gateway

Management Summary Attacks via dependencies are no longer a fringe topic, but the most convenient shortcut into the heart of modern IT. The truth: most environments know their software supply chain only in fragments. Package managers resolve transitively, CI/CD distributes diligently, and no one notices when a component has ...

CCNet

CCNet

Feb 6, 2026   •  3 min read

Close the entry gates: vulnerabilities, phishing, web apps

Close the entry gates: vulnerabilities, phishing, web apps

Why these three doors dominate Uncomfortable but true: attackers don’t need exotic exploits. In an above-average number of cases, open vulnerabilities, unrealistic awareness, and web applications with weak input validation are enough. The rest is speed. Defenders don’t lose “intelligence” — they lose discipline: missing patching SLOs, half-hearted MFA ...

CCNet

CCNet

Feb 2, 2026   •  3 min read

Germany Under Pressure: Why Case Numbers Are Exploding

Germany Under Pressure: Why Case Numbers Are Exploding

Management Summary An uncomfortable diagnosis: Germany is economically attractive to ransomware actors. High value creation depth, dense supply chains, a strong SME sector — combined with operational weaknesses in phishing defense, vulnerability remediation, and decision-making paths. In addition, a relatively high willingness to pay fuels the attacker economy. Anyone who does ...

CCNet

CCNet

Jan 30, 2026   •  3 min read

Ransomware: A Business Model Scales

Ransomware: A Business Model Scales

Management Summary The hard truth: ransomware is no longer a “special case,” but industrial day-to-day business for attackers. The RaaS model lowers entry barriers, professionalizes processes, and spreads risk across many actors. Organizations fail less because of missing tools than because of a lack of discipline in basic controls, clear ...

CCNet

CCNet

Jan 26, 2026   •  3 min read