Ermittler zerschlagen Plattform für Online-Geldwäsche
Im Zuge der Operation Olympia wurde die kriminelle Handelsplattform “cryptomixer.io” abgeschaltet. Bundeskriminalamt Ermittlern aus Deutschland und der […]
Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth
Lancaster’s arrival brings significant North American channel experience and expertise, supporting usecure’s ambition to cement its […]
12 signs the CISO-CIO relationship is broken — and steps to fix it
Despite the need for collaboration between security and IT, all is not well in the CISO-CIO […]
Top 5 Enterprise Security Trends For 2026
Enterprise security is approaching one of the most critical periods as we approach 2026. The speeding […]
Google-Antigravity-Lücke: KI-Coding-Tool anfällig für Angriffe
Eine Sicherheitslücke in Googles KI-Coding-Tool Antigravity erlaubt es Angreifern, Schadcode einzuschleusen. Koshiro K – shutterstock.com Anfang […]
RomCom tries dropping a not-so-romantic payload on Ukraine-linked US firms
US firms with ties to projects supporting Ukraine are being targeted by the Russia-aligned RomCom group, […]
Scattered Lapsus$ Hunters target Zendesk users with fake domains
Scattered Lapsus$ Hunters targeted Zendesk users through more than 40 fake domains designed to steal credentials […]
Spotlight: Making the most of multicloud
Download the December 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]
Empathetic policy engineering: The secret to better security behavior and awareness
In many companies, IT security guidelines encounter resistance because employees perceive them as obstructive or impractical. […]
7 Security-Praktiken zum Abgewöhnen
Aus der Zeit gefallen? Sergio Delle Vedove | shutterstock.com Schlechte Angewohnheiten abzustellen (oder bessere zu entwickeln), […]