
How CISOs can use identity to advance zero trust
AI is the best thing that’s ever happened to cybercriminals. It allows them to weaponize trust […]

Download the Strategizing Data Analytics for AI Enterprise Spotlight
Download the April 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

Altgeräte bedrohen Sicherheit in Unternehmen
width=”2500″ height=”1406″ sizes=”(max-width: 2500px) 100vw, 2500px”>Schwachstellen in alten Netzwerkgeräten stellen ein erhebliches Sicherheitsrisiko für Unternehmen dar. […]

Oracle warns customers of health data breach amid public denial
Oracle’s healthcare subsidiary, Oracle Health, has suffered a data breach, potentially exposing customers’ sensitive data, the […]

LLMs are now available in snack size but digest with care
As large language models (LLMs) gain mainstream, they are pushing the edges on AI-driven applications, adding […]

After fake employees, fake enterprises are next hiring threat to corporate data
Chinese companies are trying to cut Taiwan’s lead in semiconductor technology by hiring away its best […]

Infostealer malware poses potent threat despite recent takedowns
Despite the takedown of Redline — the most prolific stealer of 2024 — and Meta Stealer […]

6 hard-earned tips for leading through a cyberattack — from CSOs who’ve been there
An incident response plan is central to ensuring your organization is prepared for a cyberattack. But […]

7 Wege, Daten (besser) zu verschlüsseln
Verschlüsseln Sie Ihre Daten zeitgemäß? JLStock | shutterstock.com Das Konzept der Kryptografie existiert schon ein paar […]

Volume of attacks on network devices shows need to replace end of life devices quickly
Two of the top three vulnerabilities that threat actors tried to leverage in 2024 were in […]