What augmented intelligence really means for fintech leaders
Artificial Intelligence (AI) has been the buzzword in the fintech industry more than ten years now. […]
5 trends reshaping IT security strategies today
Cybersecurity’s core mission remains the same: Defend the organization from all the dangers that lurk in […]
Zehn Karrierekiller für CISOs
CISOs müssen sich anpassen und weiterentwickeln. Nur so können sie selbst und ihre arbeitgebenden Unternehmen florieren. […]
VoidProxy phishing-as-a-service operation steals Microsoft, Google login credentials
Identity and access management provider Okta has discovered what it says is a novel phishing-as-a-service (PhaaS) […]
VMScape Spectre BTI attack breaks VM isolation on AMD and Intel CPUs
Researchers have demonstrated a Spectre-like CPU branch target injection attack that allows malicious virtual machine users […]
How Wesco cut through the noise and reimagined risk management
Wesco is best known as a leading supply chain partner that provides electrical and communication systems […]
2025 CSO Hall of Fame: Laura Deaner on AI, quantum threats, and cyber leadership
Laura Deaner, recently appointed chief information security officer at the Depository Trust & Clearing Corporation (DTCC), […]
Stealthy AsyncRAT flees the disk for a fileless infection
Security researchers have discovered an open-source remote access trojan, AsyncRAT, being delivered through a multi-stage, in-memory […]
Why domain-based attacks will continue to wreak havoc
Among the numerous cyber threats that enterprises must contend with, domain-based attacks hold a prominent position. […]
12 digital forensics certifications to accelerate your cyber career
Digital forensics is a critical function for any enterprise. After a cyberattack, forensic professionals investigate how […]