MENU

Your IT Security and Quality – independently checked

TÜV tested – this additional endorsement is always considered to be a seal of quality not only in Germany, but globally, and with good reason. What is true for cars, machines, plants or buildings, TÜViT has been making it possible for hardware and software for more than 20 years: certified, secure products and systems that your clients can rely on.

Our videos

#explore - the online magazine of TÜV NORD GROUP

messinger-berlinci161018_npdT5
Surveillance cameras

What are the implications of smart video surveillance for data protection?

Video cameras designed to use facial recognition to identify criminals, terrorists or other individuals of concern are already in use on a trial basis at Berlin Südkreuz railway station. This project of the German Ministry of the Interior has sparked fierce controversy around the questions of the legal basis for the use of smart video surveillance and its implications for data protection.
Read more
Privacy by Design

What is Privacy by Design?

It always used to be the case that data protection was at the bottom of the pile when it came to software development. Privacy by Design is now set to change this. Thanks to the General Data Protection Regulation, this principle is even going to be mandatory for companies as of 25 May 2018. Jörg Schlißke explains what's behind the concept and how it will improve data protection for users.
Read more
Fake News

The truth about fake news

Fake news is now so well camouflaged that, to the untrained eye, it’s very difficult to recognise it as fabricated. But what exactly is fake news? How do false reports spread, and how can you identify them? Dirk Kretzschmar answers these questions in #explore.
Read more
607969272
Security by Design

What is Security by Design?

Software, hardware and security are subjects that have always been very closely linked. And yet, in the light of increasing networking with the Internet, they will have to dovetail even more closely in the future if protection is to be guaranteed.
Read more
Common Criteria

What are the Common Criteria?

Against the backdrop of an increasingly networked world and the need for ever greater security in the field of IT, the Common Criteria (CC) are growing in importance.
Read more
WannaCry-Attacke

WannaCry: What you need to know about the cyber-attack

The cyber-attack with the ransomware known as "WannaCry" has since 12 May been infecting computers throughout the world with a crypto-trojan which encrypts and then locks the data of the affected computers. Dirk Kretzschmar answers the most pressing questions in #explore.
Read more
Cyber Security

Digital Society Institute: Research to improve IT security

Security policy, cyber security, data protection and privacy: these are issues close to Isabel Skierka’s heart.
Read more
Cyber-attack
Hacking attacks on Telekom routers

Deutsche Telekom cyber-attacks

In this interview, Dirk Kretzschmar, Managing Director of TÜViT, explains how and why the networks were brought down and what his company can offer for effective protection against such threats from cyberspace.
Read more
The "good" hacker
Protection against cyber-attacks

What is a "good" hacker?

Cyber attacks are an increasing threat to private individuals, companies and government agencies alike – the consequences can be immense. To avoid these, TÜViT experts uncover vulnerabilities and provide security.
Read more