CISOs reposition their roles for business leadership
They may have the word “security” in their title, but the mandate for today’s CISOs is […]
																		Cloud assets have 115 vulnerabilities on average — some several years old
Companies are having a hard time keeping their cloud infrastructure secure and the race to adopt […]
																		Cyberbedrohungen erkennen und reagieren: Was NDR, EDR und XDR unterscheidet
Mit Hilfe von NDR, EDR und XDR können Unternehmen Cyberbedrohungen in ihrem Netzwerk aufspüren. Foto: alphaspirit.it […]
																		Cyberbedrohungen erkennen und reagieren: Was NDR, EDR und XDR unterscheidet
Mit Hilfe von NDR, EDR und XDR können Unternehmen Cyberbedrohungen in ihrem Netzwerk aufspüren. Foto: alphaspirit.it […]
																		Microsoft startet neues europäisches Sicherheitsprogramm
Microsoft will die Cybersicherheit in Europa stärken. MeshCube – shutterstock.com Microsoft warnt davor, dass sich Ransomware-Gruppen […]
																		New phishing campaign hijacks clipboard via fake CAPTCHA for malware delivery
A new wave of browser-based phishing tricks unsuspecting users into copy-pasting malicious commands into their systems, […]
																		Colossal breach exposes 4B Chinese user records in surveillance-grade database
A colossal data breach has reportedly exposed approximately four billion records containing personal information of hundreds […]
																		Don’t give hacktivists what they really want
Recently, several important Swedish services have been hit by distributed denial-of-service attacks: a few weeks ago […]
																		CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness
CISOs have been urged to demand clear post-quantum cryptography (PQC) readiness roadmaps from vendors and partners […]
																		Cybersecurity in der Lieferkette: Wie Sie Ihre Software-Supply-Chain schützen
Um Ihre Software-Lieferkette zu schützen, kann Generative AI sehr hilfreich sein. NTPY -Shutterstock.com Es klingt wie […]