Services
Assessment of the Current Security Posture
Internal Risk Analysis
Internal Penetration Test
External Penetration Test
Phishing Awareness Training
Physical Red Teaming
Strengthening Your IT Security
Managed Detection & Response (MEDR/MXDR)
Security Operations Center (SOC)
Zero-Trust-Network-Access (ZTNA)
Incident Readiness Consulting
Security Culture & Awareness Program
Honeypot Implementation
Ot-Shield
Emergency Support for IT Security Incidents
Incident Response
IT Forensics
Compliance & Certification
ISO 27001 & ISMS Implementation
NIS2 compliance consulting
Business Continuity Management (BCM)
Visit our blogs
Contact our sales department
Imprint
Company
Blog
Customer references
Contact
Emergency?
🇬🇧
🇩🇪
CH
DE
Emergency?
Services
Assessment of the Current Security Posture
Internal Risk Analysis
Internal Penetration Test
External Penetration Test
Phishing Awareness Training
Physical Red Teaming
Strengthening Your IT Security
Honeypot Implementation
Managed Detection & Response (MEDR/MXDR)
Security Operations Center (SOC)
Zero-Trust-Network-Access (ZTNA)
Incident Readiness Consulting
Security Culture & Awareness Program
Ot-Shield
Emergency Support for IT Security Incidents
IT Forensics
Incident Response
Compliance & Certification
ISO 27001 & ISMS Implementation
NIS2 compliance consulting
Business Continuity Management (BCM)
Company
Blog
Customer references
Contact
🇩🇪
🇬🇧
CH
DE
Blog
In our blog posts and video formats, we explain everything you need to know about IT security – in easy-to-understand language.
Improved SOC offering: Collaboration with Cyrebro
13.01.2025
Hacker protection: This is how IT logins must be done in companies in 2025
15.11.2024
Improved Phishing Awareness Campaigns with Lucy Security
14.10.2024
Security Operations Center (SOC) for companies: What you need to know
11.06.2024
Curse or blessing? The dangers of AI in IT security
28.05.2024
Trufflepig expands into Switzerland with new location
24.04.2024
The 5 most common hacker attacks on companies
26.03.2024
How to detect data theft by employees
04.03.2024
The five biggest physical IT security risks
26.02.2024
The danger of hacker attacks: What threatens your company
23.02.2024
Backup | Typical IT security mistakes #2
21.02.2024
This is what awaits us in 2024 (+ 2023 in review)
06.02.2024
After the risk analysis: systematically protect IT from hacker attacks
22.01.2024
Ransomware attack: How to minimize the damage
11.01.2024
Phishing: Training employees with real attacks
10.01.2024
Ransomware attack: should you pay?
08.12.2023
Trufflepig supports AI-powered cybersecurity project (CAIDAN)
17.11.2023
How a small phishing email became a ransomware attack in an educational organization #case-report-1
08.11.2023
Bitkom study: backlog in employee training
07.11.2023
Incident response: What to do when you're hacked
27.10.2023
The real cost of a ransomware attack
25.10.2023
Cyber insurance: What companies need to know
20.10.2023
Avoid corporate liability in the event of hacker attacks
09.10.2023
How to recognize a hacker attack and react correctly in a company
18.09.2023
Phishing – An overview of the most important information
13.09.2023
Cyber risk analysis within a few weeks
25.08.2023
Ransomware: What you need to know
18.08.2023
Cybersecurity in public service: Trufflepig pentest at KUS Pfaffenhofen
31.07.2023
IT forensics: What business owners need to know
12.07.2023
How companies protect themselves from hacker attacks
11.07.2023
Valuable information on "IT security" once a month via
Newsletter