 
																		CISA releases Thorium, an open-source, scalable platform for malware analysis
The US Cybersecurity and Infrastructure Security Agency (CISA) has released Thorium, a high-throughput open-source platform for […]
 
																		MCP: securing the backbone of Agentic AI
The model context protocol (MCP) was only introduced at the end of 2024, but the technological […]
Open Banking: Balancing Innovation & Risk
With the changing needs of customers and the emergence of an increasingly digital financial service industry, […]
 
																		CrowdStrike: A new era of cyberthreats from sophisticated threat actors is here
CISOs and their teams are entering a “new era” of cyberthreats characterized by sophisticated threat actors […]
 
																		6 things keeping CISOs up at night
CISOs have a lot on their minds, from team’s burn out, AI risks to the pressure […]
 
																		Der Kaufratgeber für Breach & Attack Simulation Tools
Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman […]
 
																		How NDR Identifies Malware Through Traffic Analysis Patterns and Behaviors
Massive volumes of network traffic flow across your environment every second, and traditional security tools can […]
 
																		Cybercrooks faked Microsoft OAuth apps for MFA phishing
Threat actors have cooked up a clever way to slip past multifactor authentication (MFA), tricking users […]
 
																		Spotlight report: How AI is reshaping IT
Download the August 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]
 
																		Wie EDR EDR aushebelt
Legitime Security-Tools gegeneinander auszuspielen, eröffnet Cyberkriminellen diverse Vorteile. Tero Vesalainen | shutterstock.com Cybersicherheitsforscher haben einen unheilvollen […]
