 
																		Midsize firms universally behind in slog toward DORA compliance
Beginning Friday, Jan. 17, all EU financial institutions are now required to operate in compliance with […]
 
																		Diese Security-Technologien haben ausgedient
Zeit für eine Frischzellenkur? JL_OFF | shutterstock.com Sicherheitsentscheidern steht eine ständig wachsende Auswahl von digitalen Tools […]
 
																		Secure AI? Dream on, says AI red team
The group responsible for red teaming of over 100 generative AI products at Microsoft has concluded […]
 
																		US hits back against China’s Salt Typhoon group
The US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is […]
 
																		DORA-Umsetzung hält Banken-CISOs auf Trab
Finanzunternehmen müssen seit heute die neuen Regeln der EU-Verordnung DORA anwenden. Doch viele kämpfen noch immer […]
 
																		Poor patching regime is opening businesses to serious problems
Vulnerability remediation is taking a severe hit as security teams are faced with fatigue from a […]
 
																		EU’s DORA could further strain cybersecurity skills gap
Efforts spent in achieving compliance with the EU’s Digital Operational Resilience Act (DORA) are likely to […]
 
																		Was ist ein Payload?
Ähnlich wie damals die griechischen Soldaten, die im Inneren des trojanischen Pferdes auf den passenden Zeitpunkt […]
 
																		Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers
There are more than 4 million vulnerable hosts on the internet that accept unauthenticated traffic, say […]
 
																		How do you unlock automation within IT security and IT operations?
The proliferation of endpoints in today’s enterprises is outpacing the ability of IT operations and security […]
