Magazine.

Why is our blog called "magazine"?
The term "blog" is a compound of the words web (for internet) and log (diary) and was created in America. In the beginning, blogs were chronologically sorted journals kept on the internet in which people reported on their experiences or adventures.
A magazine, on the other hand, is less chronological. Similar to a printed magazine, it covers a variety of topics around a main theme. Instead of short daily reports, carefully researched articles on certain key topics appear at longer intervals.
Even though the boundaries between blog and magazine are fluid today, we therefore classify our blog as a magazine.
And as with everything we do at essendi it, we set high standards for the blog. Every contribution offers great reader benefit and adds to our online encyclopaedia, a knowledge database that you can help yourself to at any time.
Are you missing a topic, do you have questions or suggestions? We look forward to hearing from you.

Magazine March 28, 2024

PKI in IoT and OT

View More
Magazine March 6, 2024

What is cryptography?

View More
Magazine February 6, 2024

What is a Managed PKI?

View More
Magazine January 15, 2024

What is a Public Key Infrastructure (PKI)?

View More
Magazine November 22, 2023

The Zero Trust Security Framework

View More
Magazine September 29, 2023

90 days certificate term. Get ready with essendi xc.

View More
Magazine September 7, 2023

Spectre Ransomware

View More
Magazine August 21, 2023

Danger from Quantum Computing

View More
Magazine June 16, 2023

Armed against hacker attacks?

View More
Magazine May 31, 2023

ChatGPT and AI systems

View More
Magazine March 31, 2023

Google wants 90-day term for SSL certificates

View More
Magazine February 8, 2023

Why is IT compliance important?

View More
Magazine January 30, 2023

What is IT compliance?

View More
Magazine December 15, 2022

Why do companies need an IT security architecture?

View More
Magazine October 11, 2022

Interview: Behind the Scenes it-sa 2022

View More
Magazine October 5, 2022

What are digital identities?

View More
Magazine August 24, 2022

Comparing certificate management tools

View More
Magazine July 26, 2022

A comparison of important
information security standards

View More
Magazine June 1, 2022

Certificate errors can bring entire systems to a standstill

View More
Magazine May 31, 2022

What is a quantum computer?

View More
Magazine April 29, 2022

Crypto management as a protection against malware

View More
Magazine April 11, 2022

What are cryptocurrencies?

View More
Magazine January 28, 2022

Malware on the rise

View More
Magazine December 6, 2021

The 5 most important questions about the certificate life cycle

View More
Magazine December 2, 2021

Hackers love the Christmas rush

View More
Magazine September 22, 2021

How CT Standard and Log Monitoring work

View More
Magazine September 16, 2021

What is key management?

View More
Magazine July 29, 2021

What is SIEM?

View More
Magazine July 14, 2021

Digital certificates with increasingly shorter validity period

View More
Magazine May 23, 2021

Managing TLS/SSL certificates with CaaS

View More
Magazine December 30, 2020

How does the internet get into our homes?

View More
CALL
CONTACT