{"id":60,"date":"2024-01-08T11:14:40","date_gmt":"2024-01-08T10:14:40","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=60"},"modified":"2025-08-06T09:34:39","modified_gmt":"2025-08-06T07:34:39","slug":"about","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/about\/","title":{"rendered":"About us"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:55%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-68ac22a5b30ce8c4cc5056c69f1bfb93\"><strong>About us<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color wp-elements-998faa001cdd03baae673f49db97fa01\" style=\"font-style:normal;font-weight:600\">Doing bad stuff for the right reason!<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\">Contact us<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-trojanisches-pferd2.svg\" alt=\"About us\" class=\"wp-image-563\" style=\"width:469px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-c185997d wp-block-group-is-layout-flex\" style=\"margin-top:150px;margin-bottom:150px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-55c930557b6647ebd97dd91a37d29552 wp-container-content-e7bfab89\">Working with Laokoon Security requires commitment and dedication. But you get it back twice and three times over. They find vulnerabilities that others overlook and assess them with their background and experience as real attackers.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-f2c9f27baddc83bb92eeb63cf0dbe20f wp-container-content-577e1c61\"><em>CISO of an MDAX company<br><\/em><a href=\"https:\/\/laokoon-security.com\/en\/service\/red-teaming\/\" data-type=\"page\" data-id=\"44\"><span style=\"text-decoration: underline;\"><strong>Red Teaming<\/strong><\/span><\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons lk-quote-cta wp-container-content-8919bbe9 is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:20px;margin-bottom:20px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-custom-blau-darkmode-ignore-background-color has-background wp-element-button\" href=\"#cta\">Contact us<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group image-title-box is-layout-flex wp-container-core-group-is-layout-2cfae04c wp-block-group-is-layout-flex\" style=\"margin-top:150px;margin-bottom:150px;padding-right:20px;padding-left:20px\">\n<figure class=\"wp-block-image size-full has-custom-border wp-container-content-0733e5d0 wp-duotone-14374a-ffffff-1\"><img decoding=\"async\" width=\"1707\" height=\"2560\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/Andi-black-scaled.jpg\" alt=\"\" class=\"wp-image-1164\" style=\"border-radius:10px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/Andi-black-scaled.jpg 1707w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/Andi-black-200x300.jpg 200w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/Andi-black-683x1024.jpg 683w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/Andi-black-768x1152.jpg 768w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/Andi-black-1024x1536.jpg 1024w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/Andi-black-1365x2048.jpg 1365w\" sizes=\"(max-width: 1707px) 100vw, 1707px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group content-box-45637 wp-container-content-a5fc19f1 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-6d04d64c wp-block-group-is-layout-flex\" style=\"padding-left:0px\">\n<h3 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:500\">Laokoon SecurITy<\/h3>\n\n\n\n<p>Laokoon SecurITy was founded in 2016 by a collective of experienced hackers from the German Armed Forces and other federal security agencies.<\/p>\n\n\n\n<p>With our focus and expertise in offensive security, penetration tests and red teaming campaigns are not only an integral part of our portfolio, but our core competence. <\/p>\n\n\n\n<p>This specialisation is also reflected in our other products, which benefit from our experience as an attacker. <\/p>\n\n\n\n<p>Our employees can draw on many years of experience in the areas of IT operations, (IT) risk management and IT security management. We have already faced many exciting challenges, such as the organisational and technical protection of networked data centres or the design, implementation and operation of DMZs for federal authorities.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide main-client-slider-section-container has-lk-gradient has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-797ed275 wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:50px;padding-right:15px;padding-bottom:50px;padding-left:15px\">\n<h3 class=\"wp-block-heading has-text-align-center wp-container-content-958eb9dc\">Our certifications<\/h3>\n\n\n\n<p class=\"has-text-align-center\">We are comprehensively certified to the highest standards.<\/p>\n\n\n\n<div class=\"wp-block-group lk-cients wp-container-content-958eb9dc is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:60px;margin-bottom:60px\">\n<div class=\"wp-block-group logo-slider wp-container-content-958eb9dc is-content-justification-center is-layout-flex wp-container-core-group-is-layout-b02886af wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group swiper-wrapper wp-container-content-958eb9dc is-nowrap is-layout-flex wp-container-core-group-is-layout-415537ea wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group swiper-slide wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GXPN.png\" alt=\"GIAC Exploit Researcher and Advanced Penetration Tester\" class=\"wp-image-1473\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GXPN.png 600w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GXPN-300x300.png 300w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GXPN-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-e62d88ae1c8f028be69874c4846ec62b wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/oscp-pq3z4fdngl457sb9xm2gs8cgif202x4aezvrucj2z4.png\" alt=\"Offensive Security Certified Professional\" class=\"wp-image-1136\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/oscp-pq3z4fdngl457sb9xm2gs8cgif202x4aezvrucj2z4.png 200w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/oscp-pq3z4fdngl457sb9xm2gs8cgif202x4aezvrucj2z4-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-46df047389945b85b3593da5895bf2f5 wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/03\/CRTO.webp\" alt=\"Certified Red Team Operator\" class=\"wp-image-3511\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/03\/CRTO.webp 400w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/03\/CRTO-300x300.webp 300w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/03\/CRTO-150x150.webp 150w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/03\/CRTO-12x12.webp 12w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><figcaption class=\"wp-element-caption\"><br><\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-b199f2eb9693c13da15a95169e1e3fad wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GMOB.png\" alt=\"GIAC Mobile Device Security Analyst\" class=\"wp-image-1475\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GMOB.png 600w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GMOB-300x300.png 300w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GMOB-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-7d5e275d0dc3e94a97d3a02836b55ceb wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/OSCE-pq3z67aodbjn59qfkdp3hs7swmaymc61bs8sh5wb80.png\" alt=\"Offensive Security Certified Expert\" class=\"wp-image-1138\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/OSCE-pq3z67aodbjn59qfkdp3hs7swmaymc61bs8sh5wb80.png 200w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/OSCE-pq3z67aodbjn59qfkdp3hs7swmaymc61bs8sh5wb80-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-6d60adfa5903e6f8277aa8bc3c76abf8 wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GWAPT.png\" alt=\"GIAC Web Application Penetration Tester\" class=\"wp-image-1476\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GWAPT.png 600w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GWAPT-300x300.png 300w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GWAPT-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-c318e1f55ba1f8c10f7e86bc02e85d52 wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized is-style-default\"><img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GOSI.png\" alt=\"GIAC Open Source Intelligence\" class=\"wp-image-1478\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GOSI.png 600w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GOSI-300x300.png 300w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GOSI-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-0bc606b02770f1797f4674ee31b2b5d4 wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GAWN.png\" alt=\"GIAC Assessing and Auditing Wireless Networks\" class=\"wp-image-1477\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GAWN.png 600w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GAWN-300x300.png 300w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/GAWN-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-6756f8e786cfc9cc04eb1340b382526b wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/oswe-pq3z2zoj0p5dh8edbhpzh3e3u84tbkf1vw02g4nqhc.png\" alt=\"Offensive Security Web Expert\" class=\"wp-image-1137\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/oswe-pq3z2zoj0p5dh8edbhpzh3e3u84tbkf1vw02g4nqhc.png 200w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/oswe-pq3z2zoj0p5dh8edbhpzh3e3u84tbkf1vw02g4nqhc-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-primary-color has-text-color has-link-color wp-elements-0d0b09f1f00baff0ab145de6cf89d348 wp-container-content-9cfa9a5a is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-3ec81f88 wp-block-group-is-layout-flex\" style=\"border-radius:0px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"340\" height=\"340\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/CISSP.png\" alt=\"ISC2 Certified Information Systems Security Professional \" class=\"wp-image-1482\" style=\"width:150px\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/CISSP.png 340w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/CISSP-300x300.png 300w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/CISSP-150x150.png 150w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-content-justification-left is-layout-flex wp-container-core-group-is-layout-679eff90 wp-block-group-is-layout-flex\" style=\"margin-top:120px;margin-bottom:120px;padding-right:10px;padding-left:10px\">\n<h2 class=\"wp-block-heading has-text-align-left wp-container-content-f22b2ade\">Our history<\/h2>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-a14d19d2 wp-block-group-is-layout-flex\" style=\"margin-top:60px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group line-holder wp-container-content-b3829bdc is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<div class=\"timline-line\"><\/div>\n\n\n\n<div class=\"timline-line-base\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group timeline-boxes-holder wp-container-content-68ac353a is-layout-flex wp-container-core-group-is-layout-4255f73a wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<p>2016<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Laokoon SecurITy is founded<\/h6>\n\n\n\n<p>A collective of hackers from the German Armed Forces decides to found Laokoon Security and offer as a service what all the founders are passionate about: Hacking and cybersecurity.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<p>2019<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Laokoon Security becomes a UG and publishes book<\/h6>\n\n\n\n<p>After the first extensive assignments as a sideline, it becomes clear that the collective is developing as an entrepreneur. The first employees are hired and the book \"Cybersecurity in der Praxis\" is published by IDW Verlag.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<p>2022<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Change of shareholders and growth<\/h6>\n\n\n\n<p>Following a change in the shareholder structure, Laokoon Security is continuing to focus on its core business: providing high-quality offensive cybersecurity services to the German market.<\/p>\n\n\n\n<p>Laokoon Security wins the Cybersecurity Ideas Competition and is invited to take part in the Cybersecurity Accelerator Programme of the <a href=\"https:\/\/www.digitalhub.de\/\" target=\"_blank\" rel=\"noopener\">Digitalhub.DE<\/a> invited.<\/p>\n\n\n\n<p>Together with other partners, Laokoon Security is also organising one of the <a href=\"https:\/\/laokoon-security.com\/en\/hackers-compete-at-capture-the-flag-event-in-bonn\/\" data-type=\"post\" data-id=\"2895\">largest German hacker competitions<\/a> and continues to grow in terms of personnel.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<p>2023<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Laokoon SecurITy becomes a limited liability company<\/h6>\n\n\n\n<p>The prepared change of corporate form is completed. Laokoon Security now operates as a limited liability company. We continue to attach great importance to absolute independence, which is why we do not have any external investors. <\/p>\n\n\n\n<p>For the second time, Laokoon Security is organising a hacker competition with partners in Bonn, which is officially Germany's largest Capture The Flag event with 120 participants.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group image-title-box is-layout-flex wp-container-core-group-is-layout-931c2256 wp-block-group-is-layout-flex\" style=\"margin-top:250px;margin-bottom:250px;padding-right:20px;padding-left:20px\">\n<figure class=\"wp-block-image size-full is-resized has-custom-border wp-container-content-0733e5d0\"><img decoding=\"async\" width=\"1154\" height=\"1920\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2025\/08\/Cybersecurity-in-der-Praxis-2Auflage.jpg\" alt=\"\" class=\"wp-image-4015\" style=\"border-radius:10px;width:566px;height:auto\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2025\/08\/Cybersecurity-in-der-Praxis-2Auflage.jpg 1154w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2025\/08\/Cybersecurity-in-der-Praxis-2Auflage-180x300.jpg 180w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2025\/08\/Cybersecurity-in-der-Praxis-2Auflage-615x1024.jpg 615w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2025\/08\/Cybersecurity-in-der-Praxis-2Auflage-768x1278.jpg 768w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2025\/08\/Cybersecurity-in-der-Praxis-2Auflage-923x1536.jpg 923w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2025\/08\/Cybersecurity-in-der-Praxis-2Auflage-7x12.jpg 7w\" sizes=\"(max-width: 1154px) 100vw, 1154px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group content-box-45637 wp-container-content-a5fc19f1 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-6d04d64c wp-block-group-is-layout-flex\" style=\"padding-left:0px\">\n<h3 class=\"wp-block-heading fade-up\">Cybersecurity in practice<\/h3>\n\n\n\n<p>The founders of Laokoon SecurITy published the practical guide \"Cybersecurity in Practice\" back in 2019.  In July, the brand-new, updated second edition was published in the <a href=\"https:\/\/shop.idw-verlag.de\/Cybersecurity-in-der-Praxis-2.-Auflage\/12565\" data-type=\"link\" data-id=\"https:\/\/shop.idw-verlag.de\/Cybersecurity-in-der-Praxis-2.-Auflage\/12565\" target=\"_blank\" rel=\"noopener\">IDW Publishing House<\/a>.<\/p>\n\n\n\n<p>This practical guide introduces you to the topic of cybersecurity. <br>Various relevant aspects are clearly illustrated without assuming any prior technical knowledge. The authors highlight potential risks for your practice and your customers and explain possible courses of action.<\/p>\n\n\n\n<p>Among other things, the book looks at state-of-the art measures for basic cybersecurity protection and evaluates these, for example based on the expected costs or the complexity of the measure for different company sizes.<br><br>In addition to a description of your own room for manoeuvre, you will learn about the advantages and disadvantages of the measures presented.<br><br>The practical guide also provides an insight into the following current topics:<\/p>\n\n\n\n<ul style=\"margin-top:5px;margin-bottom:25px\" class=\"wp-block-list checklist\">\n<li>Support for cloud services<\/li>\n\n\n\n<li>Bring-Your-Own-Device (BYOD)<\/li>\n\n\n\n<li>Use of open source software<\/li>\n<\/ul>\n\n\n\n<p>Detailed checklists support you both in the implementation of your company's own protective measures and in the professional assessment of measures to be implemented or already implemented by the customer.<br><br>The book provides you with the basis to be able to familiarise yourself with the various topics presented within a very short time, so that you can take action where necessary. In addition, you will find a comprehensive glossary explaining industry-specific terms.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:20px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/shop.idw-verlag.de\/Cybersecurity-in-der-Praxis-2.-Auflage\/12565\" target=\"_blank\" rel=\"noreferrer noopener\">order online now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-77eb75476f3e30fdb41d950146faf06b wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Clear communication<\/li>\n\n\n\n<li class=\"fade-up\">Concrete solutions<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1328 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1328\" data-uid=\"69d2c891b8c5f\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1328\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1328 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1328\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69d2c891b8c5f\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69d2c891b8c5f\" id=\"forminator-field-name-1_69d2c891b8c5f-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69d2c891b8c5f\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69d2c891b8c5f\" id=\"forminator-field-email-1_69d2c891b8c5f-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69d2c891b8c5f\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69d2c891b8c5f\" id=\"forminator-field-phone-1_69d2c891b8c5f-label\" class=\"forminator-label\">Telephone<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69d2c891b8c5f\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69d2c891b8c5f\" id=\"forminator-field-textarea-1_69d2c891b8c5f-label\" class=\"forminator-label\">What would you like to tell us?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69d2c891b8c5f\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69d2c891b8c5f\" id=\"forminator-field-consent-1_69d2c891b8c5f-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69d2c891b8c5f__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69d2c891b8c5f\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69d2c891b8c5f-label\" aria-describedby=\"forminator-field-consent-1_69d2c891b8c5f__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69d2c891b8c5f__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12  forminator-hidden\"><div role=\"group\" class=\"forminator-field\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69d2c891b8c5f-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69d2c891b8c5f-label\" class=\"forminator-label\">Checkbox<\/span><label id=\"forminator-field-checkbox-1-1-69d2c891b8c5f-label\" for=\"forminator-field-checkbox-1-1-69d2c891b8c5f\" class=\"forminator-checkbox\" title=\"\/dev\/null please\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"one\" id=\"forminator-field-checkbox-1-1-69d2c891b8c5f\" aria-labelledby=\"forminator-field-checkbox-1-1-69d2c891b8c5f-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\" aria-describedby=\"forminator-field-checkbox-1-69d2c891b8c5f-description\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">\/dev\/null please<\/span><\/label><span id=\"forminator-field-checkbox-1-69d2c891b8c5f-description\" class=\"forminator-description\">My contact request should be piped directly to \/dev\/null.<\/span><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"650f6584ee\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/60\" \/><input type=\"hidden\" name=\"form_id\" value=\"1328\"><input type=\"hidden\" name=\"page_id\" value=\"60\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/about\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_7\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_7\" type=\"text\" name=\"input_7\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-d59d9b0b wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60);padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1327.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n\n<\/style>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00dcber uns Doing bad stuff for the right reason! Mit Laokoon Security zu arbeiten, erfordert Commitment und Einsatz. Man bekommt es jedoch doppelt und dreifach zur\u00fcck. Sie finden Schwachstellen, die andere \u00fcbersehen und bewerten sie mit dem Hintergrund und ihren Erfahrungen als echte Angreifer. CISO eines MDAX-UnternehmensRed Teaming Laokoon SecurITy Laokoon SecurITy entstand 2016 aus [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":561,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-60","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/60","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=60"}],"version-history":[{"count":9,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/60\/revisions"}],"predecessor-version":[{"id":4018,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/60\/revisions\/4018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/561"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}