
Almost 1 million business and home PCs compromised after users visited illegal streaming sites: Microsoft
Careless online surfing by employees continues to be the bane of CISOs trying to keep malware […]

Backdoor in Bluetooth-Chip entdeckt
Der Chip ESP32 kommt in zahlreichen Geräten zum Einsatz. Security-Forscher haben nun eine Sicherheitslücke gefunden. Hendrik […]

Was toxische CISOs anrichten
Lipik Stock Media – shutterstock.com Für Keith, einen erfahrenen Cybersecurity-Profi aus New York City in seinen […]

CISOs and CIOs forge vital partnerships for business success
Last July, a routine update from cybersecurity software firm CrowdStrike sparked a global IT outage that […]

Suite 404: Training executives for cyberattack response in a playful way
Cyberattacks are all too common in business today. If your own company is affected, quick but […]

Linux, macOS users infected with malware posing as legitimate Go packages
In a new typosquatting campaign, threat actors are seen using malicious Go packages posing as popular […]

Mangelhafte Cybersicherheit im Gesundheitswesen
15 Prozent der Endgeräte im Gesundheitssektor haben keine oder nicht-übereinstimmende Sicherheits- und Risikokontrollen. Panya_photo – Shutterstock.com […]

8 obstacles women still face when seeking a leadership role in IT
If you are a tech leader, you might encourage your daughter to follow your path, imagining […]

BSI veröffentlicht neue Sicherheitsanforderungen für Datenbanksysteme
Die neuen BSI-Anforderungen gelten sowohl für relationale als auch NoSQL-Datenbanksysteme und berücksichtigen alle Betriebsarten. shutterstock – […]

What is risk management? Quantifying and mitigating uncertainty
What is risk management? Risk management is the process of identifying, analyzing, and mitigating uncertainties and […]