SoftwareTU Dresden: Sovereignty and responsibility in digitization – competence network data trust modelsBig Data | Data Security | Digitization
SoftwareTelekom MMS: Making blockchain data accessible – Deutsche Telekom MMS cooperates with SubsquidBlockchain | Data Security | Digitization
SoftwarePailot: How data stewards contribute to a successful digitalization strategyData Security | Digitization | IT
SoftwareCloud&Heat: Strengthening digital sovereignty – New paths in the cloud with Yaook and SCS compatibilityCloud | Data Security | Digitalization | IT
SoftwareSaxony is working on digital security for the worldData Security | NEXT | Software Development | Technological Sovereignty
SoftwareBSI: How AI is changing the cyber threat landscapeArtificial Intelligence (AI) | Data Security | Digitalization | IT
MicroelectronicsHZDR: How data can be backed up permanentlyData Security | Electronics | Forschung & Entwicklung | Research & Development
SoftwareEuropean Commission: Fair digital markets – gatekeepers must comply with all DMA rules from todayData Security | Digitalization | Technological Sovereignty