• OPENVAS REPORT
  • Greenbone Basic
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
Greenbone
  • Products
    • Hardware Appliances
      • Greenbone Enterprise 6500
      • Greenbone Enterprise 5400
      • Greenbone Enterprise 650
      • Greenbone Enterprise 600
      • Greenbone Enterprise 450
      • Greenbone Enterprise 400
      • Greenbone Enterprise 150
      • Greenbone Enterprise 35
    • Virtual Appliances
      • Greenbone Enterprise EXA
      • Greenbone Enterprise PETA
      • Greenbone Enterprise TERA
      • Greenbone Enterprise DECA
      • Greenbone Enterprise CENO
      • Greenbone Enterprise 25V
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • Hardware Appliances
    • Virtual Appliances
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano

Reading time: 7 minutes

What is Data Security?

Data Security has become a top priority, since the strict data protection directives have been in force in Europe – all the more so as attacks on IT systems have greatly increased in number and harmfulness. Jan-Oliver Wagner, CEO of Greenbone, talks about the challenges for IT managers and the most efficient data security strategies.

Table of Contents

  1. What role does Data Security play today, following the introduction of the GDPR?
  2. What are the most common threats that companies and institutions face today in terms of Data Security?
  3. How does the threat situation in terms of Data Security differ between companies and government institutions?
  4. The requirements for Data Security in companies have increased significantly. Which aspects of Data Security should companies tackle first?
  5. What measures have proven successful in companies to improve Data Security? Are there differences between large and medium-sized companies?
  6. What are the most common mistakes you see companies making in terms of Data Security and how can they be avoided?
  7. How would you categorise the importance of vulnerability management tools in a company’s Data Security strategy?
  8. Why should companies favour open source-based tools when it comes to securing their data?
  9. Which new trends or technologies do you consider to be forward-looking in the area of Data Security?
  10. How can companies prepare for future challenges in Data Security?

Dr. Jan-Oliver Wagner
CEO and Co-Founder
of Greenbone

What role does Data Security play today, following the introduction of the GDPR?

We already had a high legal standard in Germany, but harmonisation at European level has given new impetus to the issue. Since the GDPR came into force, the demarcation between the EU and the rest of the world has played a greater role. However, the GDPR is about data protection, not Data Security. Data protection regulates who is allowed to do what with which data. Data security is about how data is protected. Of course, the two are closely linked.

In Europe, data protection is a human right; in the USA, it is a civil right. This creates an unresolved conflict when it comes to the Data Security of European citizens. For practical reasons, the problem is often ignored, even at the highest levels.

The more we talk about data protection, the more we talk about Data Security. Data is more secure when good data protection concepts are used, but above all when the data processing IT is secure. The latter in particular is the central topic at Greenbone, and we are receiving more enquiries as a result of the GDPR, especially as we treat all data in strict compliance with the GDPR ourselves as a German company. In practice, Data Security is often linked to compliance.

What are the most common threats that companies and institutions face today in terms of Data Security?

In terms of quantity, these are attacks that can be automated. In other words, attacks on vulnerabilities in order to subsequently activate ransomware or other malware. There are also DDOS attacks (Distributed Denial of Service), phishing and other forms of social engineering. Attacks on vulnerabilities and social engineering are also often combined. Because the costs of such attacks are extremely low, almost every company and authority is now attacked several times a day.

How does the threat situation in terms of Data Security differ between companies and government institutions?

Basically, there is no difference. Both groups process sensitive personal information of citizens, be it data in the handling of sovereign tasks, such as the creation of identity cards, or be it health data in private clinics. The risk is higher if there is either a particularly large amount of data in one place or if the protective measures are too weak. The greatest risk is when both come together.

Data Security:

Visualization of a computer network – @ your123 – #270047769 – stock.adobe.com

The requirements for Data Security in companies have increased significantly. Which aspects of Data Security should companies tackle first?

There are two lines of action that need to be pursued: organisational and technical measures. In addition to the requirements of the GDPR, the former also include risk assessments, security awareness and compliance.

The technical security measures can usually be established more quickly. From our experience, we know that organisations often have an incomplete picture of their IT infrastructure, and what is not known is not taken into account in security measures. Therefore, the most urgent first measure is to use automated checks to record the IT infrastructure and its security status as completely as possible. Prioritisation can be derived very quickly from this with the right tools. If there are already organisational risk assessments, this also helps.

What measures have proven successful in companies to improve Data Security? Are there differences between large and medium-sized companies?

I have no insight into the measures taken by a sufficiently large number of companies to be able to make a solid statement here. When defining compliance rules, I would definitely recommend making sure that those that can be checked automatically are much better suited to a permanent security process than those that have to be checked manually. This applies in particular to technical specifications for IT systems.

If you look at the three scenarios that can happen to data, i.e. deletion, manipulation and copying, a good backup strategy is of course of great importance for two of them if all other security measures have failed. It is particularly important to identify the time of the attack. For vulnerability scans, for example, this means carrying them out regularly in order to recognise when and for how long an attack was possible. If you know your vulnerabilities, you will be able to act, even if you cannot eliminate all vulnerabilities promptly or at all. Large companies are more likely to be targeted by APTs (Advanced Persistent Threats) than smaller companies. Multi-layered security concepts are important here.

Let’s talk about Data Security
in your company.

Get in touch

What are the most common mistakes you see companies making in terms of Data Security and how can they be avoided?

By far the most common mistake is that systems with vulnerabilities are not secured in good time, even though the vulnerability is known and a remedy is available, for example in the form of an update.

How would you categorise the importance of vulnerability management tools in a company’s Data Security strategy?

There are so many new vulnerabilities in a company’s IT system every day that it is impossible to eliminate all these points of attack. You are forced to take a certain amount of risk because you can only solve some of the problems. Vulnerability management solves two essential challenges: It allows IT managers to prioritise which vulnerabilities should be addressed with the limited resources available, and it gives them precise knowledge of the remaining risk. This is the only way for a company to remain capable of acting at all times – in day-to-day business or in case of a crisis.

Why should companies favour open source-based tools when it comes to securing their data?

Data security is above all a question of trust. You have to be able to trust your suppliers and the tools when it comes to protecting your data. It is well known that transparency helps to build trust. This is true in society and also in technology. Nevertheless, the open source feature alone is not enough. The manufacturer must of course establish extensive quality assurance measures.

Which new trends or technologies do you consider to be forward-looking in the area of Data Security?

Of course, AI is a forward-looking trend because it is also an attractive technology for attackers. For example, Large Language Models (LLM) can significantly increase the success rate of phishing. On the defence side, LLMs are likely to be increasingly used to predict attacks. Machine learning, on the other hand, will in future help defenders in particular to become faster in the fight against automated attacks.

For me, the trend towards better and more automated processing of vulnerability information is particularly relevant. The more information about vulnerabilities, products and threats is shared and standardised, the better the new technologies will develop. The Common Security Advisory Framework (CSAF) supported by the BSI (German Federal Office for Information Security) is one of these.

How can companies prepare for future challenges in Data Security?

Attackers are diversifying and automating themselves. Companies must do the same. In the face of many problems, companies must always do the most important things first. Only strictly evidence-based action can help here.

About the expert

Dr. Jan-Oliver Wagner, CEO and Co-Founder of Greenbone

  • Degree in Applied Systems Science, University of Osnabrück
  • Doctorate: Mathematical simulation modelling
  • Founder of Intevation GmbH
  • Popular keynote speaker and panel discussion participant, e.g. at:
    Potsdam Conference for National Cyber Security, Public IT Security (PITS), Bechtle Forum “Security Edition”

"...Do the most important things first": Protect your IT proactively with vulnerability management now and contact us!

Use the contact form to obtain further information or if you already have a specific request. We look forward to hearing from you!

I agree to the data processing for the purpose of contacting Greenbone AG. *
Greenbone does not transmit any data to third parties. You can find further information on data protection in our Privacy Policy.

Products & Solutions

  • Hardware Appliances
  • Virtual Appliances
  • OPENVAS REPORT
  • Greenbone Basic
  • Greenbone Free
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • Greenbone Web App Scanning
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
ISO27001-EN

About us

  • About Greenbone
  • Blog
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top

This site is only using technically necessary cookies. By continuing to browse the site, you are agreeing to use this cookies.

OKPrivacy policy

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Datenschutzerklärung
Einstellungen akzeptierenVerberge nur die Benachrichtigung