Don't let mistakes bother you

If you don't care, you may become a victim of spam

5 key ways attack surface management will evolve in 2026

Cyberattack surfaces in the enterprise have been expanding in both extent and complexity for several years […]

KI-gesteuerter Cyberangriff sorgt für Wirbel

Forscher wollen den ersten großangelegten Cyberangriff entdeckt haben, der von einem KI-Modell ausgeführt wurde. LALAKA – […]

Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security

The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI and several international partners, has […]

North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes

North Korea-linked Contagious Interview campaign is now luring developers with trojanized coding tasks and pulling obfuscated […]

India’s new data privacy rules turn privacy compliance into an engineering challenge

India has notified its Digital Personal Data Protection (DPDP) Rules, 2025, introducing strict consent and data […]

Gipfel in Berlin – Europa strebt digitale Souveränität an

Am 18. November 2025 findet der Summit on European Digital Sovereignty in Berlin statt. mr_tigga – shutterstock.com […]

The rise of the chief trust officer: Where does the CISO fit?

CISOs may soon find themselves operating alongside a new colleague, the chief trust officer, as more […]

ISO and ISMS: 9 reasons security certifications go wrong

ISO certifications, as well as the implementation of an Information Security Management System (ISMS) based on IT […]

Empathie trifft IT-Sicherheit: Der Weg zu gelebter Compliance

CISOs sollten Sicherheitsrichtlinien mit Blick auf die Belegschaft gestalten. earthphotostock – shutterstock.com In vielen Unternehmen stoßen […]

Was ist Social Engineering?

Mit Social-Engineering-Techniken manipulieren Cyberkriminelle die menschliche Psyche. Lesen Sie, wie das funktioniert und wie Sie sich […]

1 2 3 280