
US Treasury Department workstations breached in attack attributed to China
The US Department of the Treasury revealed on Monday that an attacker was able to bypass […]

Top 12 ways hackers broke into your systems in 2024
In 2024, hackers had a field day finding sneaky ways into systems — from convincing phishing […]

Vielen CISOs droht der Burnout
loading=”lazy” width=”400px”>Wer seinen CISO verheizt, dem drohen noch mehr Cyberrisiken. Kaspars Grinvalds – shutterstock.com Mit der […]

Blown the cybersecurity budget? Here are 7 ways cyber pros can save money
It’s hard to find a CISO or cybersecurity leader who has the money they need to […]

Third Party Risk Management: So vermeiden Sie Compliance-Unheil
Third Party Risk Management hilft Unternehmen, das Risiko von Compliance-Verstößen zu vermeiden. Foto: Diyajyoti – shutterstock.com […]

Brauchen Sie einen vCISO?
In komplexen Bedrohungslandschaften sicher bleiben, ohne das (Personal-)Budget zu sprengen? Das vCISO-Konzept stellt das in Aussicht. […]

Data protection challenges abound as volumes surge and threats evolve
In the global digital economy, data is the most important asset organizations must protect from theft […]

Security-Awareness-Trainings – ein Ratgeber
Wenn Ihre erste Verteidigungslinie fällt, haben Cyberschurken leichtes Spiel. Leremy | shutterstock.com Security-Awareness-Schulungen sind für Unternehmen […]

Network problems delay flights at two oneworld Alliance airlines
IT problems struck flights at two oneworld Alliance member airlines this week, leading to delays and […]

How are you securing your communications in the wake of the Volt Typhoon revelations?
The FBI recently released information that text messages between Apple and Android texting systems were insecure […]