Schutz von Onlinekonten: Starkes Passwort reicht nicht aus
Auch starke Passwörter bieten keinen ausreichenden Schutz vor Cyberattacken. ParinPix – Shutterstock Cyberkriminelle verschicken betrügerische Nachrichten […]
Hacker nutzen Google Gemini zur Verstärkung von Angriffen
Lesen Sie, wie Hacker den KI-Dienst Gemini von Google aktuell nutzen. Sadi-Santos – Shutterstock.com Von Regierungen […]
39% of IT leaders fear major incident due to excessive workloads
Enterprise security operations teams find themselves stretched thin and contending with an escalating cyber threat landscape […]
The CISO’s role in advancing innovation in cybersecurity
Cybersecurity leaders have an advantage when it comes to innovation given their front seat facing new […]
Cybertrends 2025: KI-Cyberwaffen, Zero Days und gefördertes Chaos
Im Jahr 2025 werden staatlich gefördertes Chaos, KI-gesteuerte Waffen und die verschwimmenden Grenzen zwischen zivilen und […]
Download the Agentic AI Enterprise Spotlight
Download the February 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]
Download the Agentic AI Enterprise Spotlight
Download the February 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]
Backdoor in Chinese-made healthcare monitoring device leaks patient data
US federal agencies have warned that a popular Chinese-made patient monitor device used in medical settings […]
How CISOs can fight burnout and extend their careers
By putting in over a decade as chief information security officer for the Commonwealth of Pennsylvania, […]
Anomaly Detection Algorithms: A Comprehensive Guide
Data anomalies indicate serious issues like fraud, cyberattacks, or system breakdowns. It is crucial to preserve […]