Intel- und AMD-Chips physisch angreifbar
Chips von Intel und AMD sind laut Forschern anfällig für physische Cyberattacken. IM Imagery – shutterstock.com […]
Disaster recovery and business continuity: How to create an effective plan
The core principles of disaster recovery (DR) and business continuity have remained relatively unchanged for decades: […]
10 Kennzahlen, die CISOs weiterbringen
Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.com […]
That innocent PDF is now a Trojan Horse for Gmail attacks
Enterprise users know by now that they shouldn’t click on suspicious-looking links or download strange files. […]
That innocent PDF is now a Trojan Horse for Gmail attacks
Enterprise users know by now that they shouldn’t click on suspicious-looking links or download strange files. […]