
Mehr Assets – mehr Angriffsfläche – mehr Risiko
loading=”lazy” width=”400px”>Unternehmen sollten ihre Angriffsflächen genau kennen. ozalpvahid – shutterstock.com Nur wer seine Angriffsflächen kennt, kann […]

What is EDR? An analytical approach to endpoint security
Endpoint detection and response (EDR) security tools monitor end-user hardware devices across a network for a […]

Neurohacks to outsmart stress and make better cybersecurity decisions
Cybersecurity is one of the most high-stress professions in the world — and it’s only worsening. […]

6 Mittel gegen Security-Tool-Wildwuchs
Viel hilft nicht immer viel. Foto: Roman Samborskyi | shutterstock.com Auf der Suche nach Möglichkeiten, sich […]

CISOs should re-consider using Microsoft RDP due to password flaw, says expert
CISOs allowing remote access to Windows machines through Remote Desktop Protocol (RDP) should re-think their strategy […]

Microsoft appoints Deputy CISO for Europe to reassure European IT leaders
Microsoft on Wednesday announced that it will be creating a new position: a Deputy CISO for […]

Download the ‘AI-Savvy IT Leadership Strategies’ Enterprise Spotlight
Download the May 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

10 insights on the state of AI security from RSA Conference
As you walk around trying to avoid the 41,000 participants at RSA Conference in San Francisco, […]

The 14 most valuable cybersecurity certifications
Cybersecurity certifications can be as volatile as stocks. Their popularity can rise and fall, they can […]

Russian APT28 hackers have redoubled efforts during Ukraine war, says French security agency
The war in Ukraine has prompted a resurgence in activity by the notorious Russian APT28/Fancy Bear […]