Don't let mistakes bother you

If you don't care, you may become a victim of spam

Ransomware-Attacke auf Willms Fleisch

Der Lebensmittelproduzent Willms Fleisch wurde vermutlich von Hackern angegriffen. Nataliia Maksymenko – Shutterstock Willms zählt zu […]

Companies are drowning in high-risk software security debt — and the breach outlook is getting worse

Organizations are taking longer to fix security flaws in their software, and the security debt involved […]

Security operations centers are fundamental to cybersecurity — here’s how to build one

Incident detection and response are fundamental responsibilities for all cybersecurity defenders. In most mid-sized and large […]

CISOs müssen OT-Risiken stärker adressieren

Da Angriffe auf OT-Bereiche zunehmen, sollten CISOs einen Exposure-Management-Ansatz verfolgen. Summit Art Creations – Shutterstock.com Die […]

Almost 1 million business and home PCs compromised after users visited illegal streaming sites: Microsoft

Careless online surfing by employees continues to be the bane of CISOs trying to keep malware […]

Backdoor in Bluetooth-Chip entdeckt

Der Chip ESP32 kommt in zahlreichen Geräten zum Einsatz. Security-Forscher haben nun eine Sicherheitslücke gefunden. Hendrik […]

Why is EDR not enough: Transition from EDR to XDR solution

Various studies reveal a startling fact: endpoint devices are the source of 90% of successful cyber-attacks […]

Was toxische CISOs anrichten

Lipik Stock Media – shutterstock.com Für Keith, einen erfahrenen Cybersecurity-Profi aus New York City in seinen […]

CISOs and CIOs forge vital partnerships for business success

Last July, a routine update from cybersecurity software firm CrowdStrike sparked a global IT outage that […]

Suite 404: Training executives for cyberattack response in a playful way

Cyberattacks are all too common in business today. If your own company is affected, quick but […]

1 77 78 79 80 81 183