InsightsInsights into our work and our topicsBlogCBAM reporting obligation - action must be taken now!Learn moreBlogSuccess in the hyperautomation of processesLearn moreBlogWhy Cybersecurity Needs Ethical HackingLearn moreSericeRelease Manager Training - Dates 2024 in Vienna and MunichLearn moreAllBlogNewsServicesSuccess StoriesTrainingsWorkshopsAllAllBlogNewsServicesSuccess StoriesTrainingsWorkshops News Six common misconceptions about enterprise cyber security Learn more Interview on digitization: “The image is colorful” Learn more News Success factors in the hyperautomation of processes Learn more News The drivers of digital transformation Learn more News The System Usability Scale – How to measure usability and UX Learn more News The vision of process automation in administration Learn more News UI Design: Differences between Wireframes, Mockups & Prototyping Learn more News User-Centered Design: user-oriented software development Learn more News Bogus security through vulnerability scans: Why Pentesting Abandonment Costs Billions Learn more News Digital transformation in the retail environment Learn more Success Stories Cloud strategy: concrete instead of cloudy Learn more