
Top 6 IDS/IPS tools — plus 4 open-source alternatives
Intrusion detection and prevention systems (IDPS) Detecting and preventing network intrusions used to be the bread […]

Cyber insurance explained: Costs, terms, how to know it’s right for your business
What is cyber insurance? Cyber insurance, also known as cyber risk insurance or cyber liability insurance […]

Knox Native macht Samsung-Geräte Behörden-sicher
Samsung Knox Native ist jetzt hierzulande erhältlich. Es soll die mobile Kommunikation sicherer machen. PeopleImages.com – […]

What’s old is new again: AI is bringing XSS vulnerabilities back to the spotlight
The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued […]

EDR und XDR bleiben wichtig
EDR- und XDR-Systeme bieten umfassende Sicherheit und Transparenz für alle Endpunkte und Netzwerke in Ihrer IT-Infrastruktur. […]

Hartkodierte Zugangsdaten in Solarwinds-Software
University of College | shutterstock.com Hartkodierte Zugangsdaten im Quellcode der Asset-Management- und IT-Ticketing-Software “Web Help Desk” […]

Crowdstrike wehrt sich gegen Action1-Gerüchte
Crowdstrike und Action1 würden grundsätzlich gut zusammenpassen. Nach den neuesten Kommunikationseskapaden wird das aber wohl nichts […]

Encryption backdoor debates rage across the planet, promising a difficult 2025 for CISOs
Compliance rules requiring encryption backdoors — not just for attachments, but for text; not just for […]

Cybersecurity bill could make ransomware payment reporting mandatory
The Australian Federal Government has introduced the Cyber Security Bill 2024 to Parliament proposing the country’s […]

Microsoft October update patches two zero-day vulnerabilities it says are being actively exploited
The drama of Patch Tuesday often revolves around zero days, which in October’s haul of 117 […]