Security-KPIs und -KRIs: So messen Sie Cybersicherheit
Cybersicherheit zu messen, ist kein Kinderspiel. Foto: Ultraskrip – shutterstock.com Eine wichtige Säule jedes ausgereiften Cyberrisk-Programms […]
																		Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang
Ransomware gang Hunters International says it’s shutting down its operations for unexplained reasons, and is offering […]
																		Endpoint Vulnerability Remediation: From Alert to Action Using EDR Tools
With the boom of cloud usage and AI, organizations have been facing an increase in cybersecurity […]
																		Hardcoded root credentials in Cisco Unified CM trigger max-severity alert
Cisco (Nasdaq:CSCO) has patched a max severity flaw in its Unified Communications Manager (Unified CM) and […]
																		Erneute Cyberattacke auf Internationalen Strafgerichtshof
Der Internationale Strafgerichtshof wurde bereists zum zweiten Mal von einer Cyberattacke getroffen. Nominesine – shutterstock.com Der […]
Why Compliance Alone Isn’t Enough: CryptoBind’s Vision
Compliance to industry standards and regulations is frequently considered the gold standard for data security in […]
																		Third-party risk management: How to avoid compliance disaster
Whether your organization is aware or not, it does relly on third-party services providers that help […]
																		Russland nutzt Medienplattform für Desinformation
Die Bundesregierung macht Russland für Desinformation im Netz verantwortlich. Skorzewiak – shutterstock.com Die Bundesregierung macht Russland […]
																		5 multicloud security challenges — and how to address them
A multicloud environment is now standard for midsize and large organizations, with tech leaders opting to […]
																		North Korean crypto thieves deploy custom Mac backdoor
North Korean threat actors are targeting companies from the Web3 and crypto industries with a backdoor […]