
How to conduct an effective post-incident review
Let’s says your organization has experienced a cybersecurity incident that had no material impact on the […]

10 essenzielle Maßnahmen für physische Sicherheit
Wenn physische Security nur immer so simpel umzusetzen wäre… Foto: Leremy | shutterstock.com Obwohl CISOs im […]

Chain IQ data theft highlights need to oversee third party suppliers
Cybersecurity experts are mulling over the meaning of Swiss supply chain management provider Chain IQ’s explanation […]

Phishing campaign abuses Cloudflare Tunnels to sneak malware past firewalls
Another threat group has started abusing the Cloudflare Tunnel service to get phishing emails into targeted […]

Foreign aircraft, domestic risks
Disclaimer: The content presented in this article is based exclusively on publicly available, unclassified information and […]

North Korea’s BlueNoroff uses AI deepfakes to push Mac malware in fake Zoom calls
In a novel social engineering campaign, North Korea’s BlueNoroff is tricking company executives into downloading fake […]

Third-party risk management is broken — but not beyond repair
Robust cybersecurity frameworks are critically important, and third-party risk management (TPRM) was once a central component […]

Asana’s MCP AI connector could have exposed corporate data, CSOs warned
CSOs with Asana’s Model Context Protocol (MCP) server in their environment should scour their logs and […]

CSO30 Australia Awards 2025: Nominations deadline extended
Nominations are officially open for the 2025 CSO30 Australia Awards, celebrating the country’s most effective and […]

5 security secrets of elite defenders
Nation-state actors and well-funded criminal organizations employ advanced persistent threat (APT) methodologies designed specifically to evade […]