
Trump shifts cyberattack readiness to state and local governments in wake of info-sharing cuts
On March 19, the White House issued the first executive order (EO) to directly address cybersecurity […]

CISOs are taking on ever more responsibilities and functional roles – has it gone too far?
When George Gerchow was CISO at Sumo Logic, his responsibilities incorporated the kind of work typically […]

Kubernetes Security: Wie Sie Ihre Cluster (besser) absichern
Anatoliy Eremin | shutterstock.com Kubernetes hat sich unter Enterprise-Softwareentwicklern zu einem durchschlagenden Erfolg entwickelt. Das veranlasst […]
Achieving Compliance with India’s Digital Personal Data Protection (DPDP) Act
India’s Digital Personal Data Protection (DPDP) Act, which came into force in July 2024, marks a […]

Attackers probing backdoor flaw in popular Cisco Smart Licensing Utility, warns SANS
Organizations running Cisco’s Smart Licensing Utility (CSLU) should update their software as soon as possible to […]

Why More Businesses Are Turning to Commercial Roof Coatings
If you’re responsible for maintaining a commercial property, the roof probably isn’t something you think about […]

CISA marks NAKIVO’s critical backup vulnerability as actively exploited
The Cybersecurity and Infrastructure Security Agency (CISA) has added a patched, high-severity vulnerability affecting NAKIVO’s backup […]

11 hottest IT security certs for higher pay today
With change a constant, IT professionals looking to improve their careers can benefit from the latest […]

Teams, Slack & Co. absichern: So wird das Collaboration-Tool kein Security-Albtraum
Collaboration Tools wie Microsoft Teams und Slack erleichtern die Zusammenarbeit mit internen und externen Partnern enorm, […]

Developers: apply these 10 mitigations first to prevent supply chain attacks
DevOps leaders hoping to find a single cybersecurity risk framework that will prevent their work from […]