
Midsize firms universally behind in slog toward DORA compliance
Beginning Friday, Jan. 17, all EU financial institutions are now required to operate in compliance with […]

Diese Security-Technologien haben ausgedient
Zeit für eine Frischzellenkur? JL_OFF | shutterstock.com Sicherheitsentscheidern steht eine ständig wachsende Auswahl von digitalen Tools […]

Secure AI? Dream on, says AI red team
The group responsible for red teaming of over 100 generative AI products at Microsoft has concluded […]

US hits back against China’s Salt Typhoon group
The US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is […]

DORA-Umsetzung hält Banken-CISOs auf Trab
Finanzunternehmen müssen seit heute die neuen Regeln der EU-Verordnung DORA anwenden. Doch viele kämpfen noch immer […]

Poor patching regime is opening businesses to serious problems
Vulnerability remediation is taking a severe hit as security teams are faced with fatigue from a […]

EU’s DORA could further strain cybersecurity skills gap
Efforts spent in achieving compliance with the EU’s Digital Operational Resilience Act (DORA) are likely to […]

Was ist ein Payload?
Ähnlich wie damals die griechischen Soldaten, die im Inneren des trojanischen Pferdes auf den passenden Zeitpunkt […]

Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers
There are more than 4 million vulnerable hosts on the internet that accept unauthenticated traffic, say […]

How do you unlock automation within IT security and IT operations?
The proliferation of endpoints in today’s enterprises is outpacing the ability of IT operations and security […]