
Der trügerische Komfort des Risikomanagements
Gefahrenmanagement statt Risikomanagement: Cybersicherheit erfordert Dringlichkeit und Entschlossenheit. Billion Photos – Shutterstock.com Herkömmliches Risikomanagement basiert auf […]

CISO success story: Predicting cyber risk (accurately) is easier with this guy’s formula
You wouldn’t expect a professional jazz musician to morph into a cybersecurity policy expert, but that’s […]

Russian cyberespionage groups target Signal users with fake group invites
Russian advanced persistent threat (APT) groups are increasingly launching phishing attacks aimed at tricking users of […]

How to prevent AI-based data incidents
It’s every company’s nightmare: A competitor is targeting its own customers with targeted campaigns. And it’s […]

Hackers gain root access to Palo Alto firewalls through chained bugs
A high-severity authentication bypass vulnerability in Palo Alto Networks’ PAN-OS software, patched last week, is now […]

Mehrheit der Deutschen fürchtet sich vor Cyberangriffen
Viele Deutsche fürchten sich vor gezielten Cyberangriffen, die von Staaten ausgehen. Andrea Danti – Shutterstock.com Eine […]

Think being CISO of a cybersecurity vendor is easy? Think again
When people in this industry hear that a CISO is working at a cybersecurity vendor, it […]

Customer Identity & Access Management: Die besten CIAM-Tools
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie […]

OpenSSH fixes flaws that enable man-in-the-middle, DoS attacks
OpenSSH, the most widely used tool for remotely managing Linux and BSD systems, received patches for […]

Ransomware-Banden geben Opfern immer weniger Zeit
width=”2494″ height=”1402″ sizes=”(max-width: 2494px) 100vw, 2494px”> Ransomware-Gruppen haben den Zeitraum bis zur Lösegeldübergabe immer mehr verkürzt. […]