Don't let mistakes bother you

If you don't care, you may become a victim of spam

Cyber insurance explained: Costs, terms, how to know it’s right for your business

What is cyber insurance? Cyber insurance, also known as cyber risk insurance or cyber liability insurance […]

Top 6 IDS/IPS tools — plus 4 open-source alternatives

Intrusion detection and prevention systems (IDPS) Detecting and preventing network intrusions used to be the bread […]

Knox Native macht Samsung-Geräte Behörden-sicher

Samsung Knox Native ist jetzt hierzulande erhältlich. Es soll die mobile Kommunikation sicherer machen. PeopleImages.com – […]

What’s old is new again: AI is bringing XSS vulnerabilities back to the spotlight

The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued […]

EDR und XDR bleiben wichtig

EDR- und XDR-Systeme bieten umfassende Sicherheit und Transparenz für alle Endpunkte und Netzwerke in Ihrer IT-Infrastruktur. […]

Hartkodierte Zugangsdaten in Solarwinds-Software

University of College | shutterstock.com Hartkodierte Zugangsdaten im Quellcode der Asset-Management- und IT-Ticketing-Software “Web Help Desk” […]

Crowdstrike wehrt sich gegen Action1-Gerüchte

Crowdstrike und Action1 würden grundsätzlich gut zusammenpassen. Nach den neuesten Kommunikationseskapaden wird das aber wohl nichts […]

Fidelis Network Detection and Response (NDR): Proactive Cyber Defense for Evolving Threats

As cyberattacks are becoming more sophisticated, traditional security measures such as firewalls and intrusion detection systems […]

Encryption backdoor debates rage across the planet, promising a difficult 2025 for CISOs

Compliance rules requiring encryption backdoors — not just for attachments, but for text; not just for […]

Cybersecurity bill could make ransomware payment reporting mandatory

The Australian Federal Government has introduced the Cyber Security Bill 2024 to Parliament proposing the country’s […]