Several countries investigate Elon Musk’s Grok after sexualized deepfakes on women and children
France and Malaysia have launched investigations against Elon Musk’s AI chatbot Grok, after it generated sexualized […]
How the Organizational Risk Culture Standard can supercharge your cybersecurity culture
You don’t lose most cyber battles to code. You lose them to culture: A rushed approval. […]
Cybersecurity firm turns tables on threat actors with decoy data trap
Cybersecurity firm Resecurity says it deliberately lured threat actors linked to Scattered Lapsus$ Hunters (SLH) alliance […]
Cybersecurity leaders’ resolutions for 2026
As the AI-hype dust settles, CISOs have a lot to focus on 2026. From ongoing struggles […]
Budget friendly DPDP Compliance for Startups & SMEs
For most startups and small-to-medium enterprises (SMEs), the Digital Personal Data Protection (DPDP) Act feels like […]
Was ist Federated Identity Management?
Federated Identity optimiert Komfort und Sicherheit auf Kosten der Komplexität. PeachShutterStock | shutterstock.com Im Kern der […]
Was bei der Cloud-Konfiguration schiefläuft – und wie es besser geht
Fehlerhaft konfigurierte Cloud-Dienste sorgen regelmäßig für Datenlecks – und schlimmeres. DC Studio | shutterstock.com Konfigurationsfehler in […]
Zero-Day Vulnerabilities: User Defence Guide
TL;DR Unpatched zero-day vulnerabilities are a serious threat. This guide gives you practical steps to reduce […]
Zero Knowledge Voting with Trusted Server
TL;DR Yes, a zero knowledge proof of voting can be made using a trusted authentication server […]
ZeroNet: 51% Attack Risks & Mitigation
TL;DR Yes, ZeroNet websites *are* susceptible to a 51% control attack (also known as a majority […]