Don't let mistakes bother you

If you don't care, you may become a victim of spam

Rethinking identity for the AI era: CISOs must build trust at machine speed

CISOs have a burgeoning identity crisis on their hands. According to Verizon’s 2025 Data Breach Investigation […]

So verändert KI Ihre GRC-Strategie

Rob Schultz / Shutterstock Da Unternehmen Cybersicherheit in ihre GRC (Governance, Risk & Compliance)-Prozesse integrieren, müssen […]

Microsoft fixes Windows 10 update flaw

It didn’t take long for some IT leaders who last month started paying to get Windows […]

5 key ways attack surface management will evolve in 2026

Cyberattack surfaces in the enterprise have been expanding in both extent and complexity for several years […]

KI-gesteuerter Cyberangriff sorgt für Wirbel

Forscher wollen den ersten großangelegten Cyberangriff entdeckt haben, der von einem KI-Modell ausgeführt wurde. LALAKA – […]

Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security

The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI and several international partners, has […]

North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes

North Korea-linked Contagious Interview campaign is now luring developers with trojanized coding tasks and pulling obfuscated […]

India’s new data privacy rules turn privacy compliance into an engineering challenge

India has notified its Digital Personal Data Protection (DPDP) Rules, 2025, introducing strict consent and data […]

Gipfel in Berlin – Europa strebt digitale Souveränität an

Am 18. November 2025 findet der Summit on European Digital Sovereignty in Berlin statt. mr_tigga – shutterstock.com […]

The rise of the chief trust officer: Where does the CISO fit?

CISOs may soon find themselves operating alongside a new colleague, the chief trust officer, as more […]

1 2 3 280