Selling to the CISO: An open letter to the cybersecurity industry
The cybersecurity market has lost its mind. It seems like every week a new vendor appears, […]
Der große KI-Risiko-Guide
KI-Risiken zu bewerten und zu quantifizieren, ist in der GenAI-Ära unerlässlich. Lerbank-bbk22 | shutterstock.com Wie jede […]
Attack Surface Management – ein Kaufratgeber
Mit diesen Attack Surface Management Tools sorgen Sie im Idealfall dafür, dass sich Angreifer gar nicht […]
Iranian APT hacks helped direct missile strikes in Israel and the Red Sea
Cyber-related activities of two Iran-linked threat actors played key roles in subsequent high-profile missile strikes, according […]
WhatsApp flaw allowed discovery of the 3.5 billion mobile numbers registered to the platform
Researchers have uncovered a WhatsApp privacy flaw that allowed them to discover the 3.5 billion mobile […]
The nexus of risk and intelligence: How vulnerability-informed hunting uncovers what everything else misses
For years, I watched organizations treat vulnerability data like a compliance chore. It was something to […]
Hidden API in Comet AI browser raises security red flags for enterprises
SquareX has disclosed a previously undocumented API within the Comet AI browser that allows its embedded […]
Datenpanne bei Eurofiber France
Der TK-Anbieter Eurofiber France ist von Datendiebstahl betroffen. PixelBiss – shutterstock.com Der TK-Konzern Eurofiber Group hat […]
Overcome the myriad challenges of password management to bolster data protection
Strengthening the protection of confidential and sensitive data is currently a priority for 40% of chief […]
Behind the firewall: The hidden struggles of cyber professionals with a disability
Problem-solving is what cyber professionals do best, but one problem the industry has yet to solve […]