centron Tech Blog:
Latest Trends and Expert Insights from the Tech World
Get all the latest news of the tech industry, guides and nice-to-knows. Use these trends, insights and expert knowledge all about cloud computing and tech in general to your advantage.
Cloud hype slowly flattening out
Cloud Hype Slowly Flattening Out After the extraordinary surge during the pandemic years, cloud providers are now reporting slower growth rates. However, the cloud continues to rank among the strongest…
Geo-redundant data center should be at least 200 km away
Geo-redundant data center should be at least 200 km away Back in December, the German Federal Office for Information Security (BSI) published version 1.0 of the “Criteria for the location…
ccloud³ by centron: Your adaptable Cloud Solution
ccloud³ by centron: Your adaptable Cloud Solution Thanks to the ccenter, deployment becomes a breeze. With our adaptable Managed Services, you can experience hassle-free IT. Dive into the fastest cloud…
Reduce risks for live-off-the-cloud attacks
Reduce risks for live-off-the-cloud attacks LOL attacks have now also arrived in the cloud age. We explain how so-called LOC attacks work and how you can minimize the risk of…
Tech Trend #1: Digital Immune System
Tech Trend #1: Digital Immune System A digital immune system can protect applications by increasing their resilience. Here you can learn more about this tech trend and how you can…
Vulnerability in Chromium-based web browsers
Vulnerability in Chromium-based web browsers In current Chromium-based web browsers such as Microsoft Edge or Google Chrome, websites can freely access the clipboard. Numerous web browsers are based on…
Vote for centron now
Vote for centron: Nominated for the Service Provider Awards 2023 centron has once again been nominated for the renowned Service Provider Awards — this year in the “Cloud Server” category.…
Hacker attack on broker service providers
Software provider victim of cyber attack The Berlin software provider Smart Insurtech was the victim of a cyber attack. Data is said not to have leaked, but several applications had…
Collection: Current Phishing Traps
Collection: Current Phishing Traps Phishing is one of the most common methods used by cybercriminals to steal login details and personal data. With regularly updated examples, this collection aims to…










