Don't let mistakes bother you

If you don't care, you may become a victim of spam

End of life for Microsoft Office puts malicious macros in the security spotlight

The upcoming end of life for Windows 10 has IT teams busy. From planning on migrations, […]

Discovery of compromised Shellter security tool raises disclosure debate

CISOs whose staff use the commercial Shellter Elite antivirus evasion software to detect vulnerabilities need to […]

Real-time Web Traffic Analysis: Why Your Security Stack Needs It Now

Web attacks have exploded in complexity. Hackers no longer send obvious malware through email attachments. They […]

Cyber Attack Simulation: Test Your Security Before Hackers Do

As per the IBM cost of Data Breach report – the average global cost of a […]

NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors

A previously undocumented Advanced Persistent Threat (APT) group, “NightEagle,” has been found targeting the Chinese government […]

Ingram Micro confirms ransomware attack after days of downtime

Ingram Micro is facing a major cybersecurity crisis as a ransomware attack has triggered a multi-day […]

Ransomware-Attacke auf Ingram Micro

Die Webseiten von Ingram Micro sind aufgrund einer Cyberattacke aktuell nicht erreichbar. Screenshot by Foundry / […]

Has CISO become the least desirable role in business?

After nine years as CSO and senior vice president of IT at Sumo Logic, George Gerchow […]

Skills gaps send CISOs in search of managed security providers

A shortage of skilled cybersecurity professionals, combined with budget cuts, is fueling growth in the managed […]

4 Wege aus der Security-Akronymhölle

Gefangen im Buchstabensud? mikeledray | shutterstock.com Vor seinen MAGA- und DOGE-Eskapaden wurde Elon Musk in erster […]

1 31 32 33 34 35 210