CrowdStrike to acquire SGNL for $740M, expanding real-time identity security
CrowdStrike will pay $740 million to acquire identity security startup SGNL, adding real-time authorization capabilities that […]
CISA flags max-severity bug in HPE OneView amid active exploitation
A max-severity remote code execution (RCE) flaw in HPE’s OneView management platform has been flagged by […]
Funk von kritischer Infrastruktur leicht abhörbar
Viele KRITIS-Einrichtungen wie Energieversorger verzichten auf verschlüsselte Funknetze. Mangkorn Danggura – shutterstock.com Etliche Einrichtungen der kritischen […]
Jamie Norton’s journey to CISO started with an early interest in computers
Jamie Norton’s parents gave him a computer as a child that he played and tinkered with […]
Enterprises still aren’t getting IAM right
Despite all the warnings, and constant news of devastating cyberattacks, enterprise users are still cutting corners […]
Cisco identifies vulnerability in ISE network access control devices
The latest flaw in Cisco Systems Identity Services Engine (ISE), which could expose sensitive information to […]
The 2 faces of AI: How emerging models empower and endanger cybersecurity
In my long career of safeguarding digital assets, I’ve seen technology shifts come and go, but […]
Cybersecurity at the edge: Securing rugged IoT in mission-critical environments
Edge computing is no longer a futuristic concept; it’s a reality shaping mission-critical operations across defense, […]
Phishing-Angreifer setzen vermehrt auf E-Mail-Routing-Lücken
Angreifer missbrauchen falsch konfigurierte Richtlinien, um Phishing-E-Mails wie interne E-Mails aussehen zu lassen, Filter zu umgehen […]
8 Strategies to Improve Cloud Visibility for Better Monitoring in 2026
Key Takeaways Improving cloud visibility requires a unified view of your assets, identities, configurations, and data […]