6 cyber insurance gotchas security leaders must avoid
Facing ever-mounting cyberthreats, enterprises are increasingly turning to cyber insurance to address the potentially severe financial […]
Patch Tuesday 2025 roundup: The biggest Microsoft vulnerabilities of the year
Every day has the potential to be a bad day for a CSO. However, the second […]
Post-Quantum Security: How GCC Governments Are Planning the Shift
The global cryptographic space is changing in a way that has not happened for many years. […]
Sieben Anzeichen dafür, dass Ihr Cybersecurity-Framework überarbeitet werden muss
Cybersecurity ist kein Nice-to-have, sondern ein Muss. Dennoch vernachlässigen immer noch zu viele Unternehmen seine Pflege. […]
React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web
The React 19 library for building application interfaces was hit with a remote code vulnerability, React2Shell, about a […]
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]
Top 5 real-world AI security threats revealed in 2025
The year of agentic AI came with promises of massive productivity gains for businesses, but the […]
Data Retention & Automatic Erasure: How to Build a Compliant Workflow
In an era defined by the exponential expansion of digital footprints, organisations are under unprecedented pressure […]
Tipps für CISOs, die die Branche wechseln wollen
Tipps für CISOs mit “Vertical-Switch-Ambitionen”. FotoDax | shutterstock.com In der Außenperspektive sollte es für Menschen, die […]
High severity flaw in MongoDB could allow memory leakage
Document database vendor MongoDB has advised customers to update immediately following the discovery of a flaw […]