Don't let mistakes bother you

If you don't care, you may become a victim of spam

So verändert KI Ihre GRC-Strategie

Rob Schultz / Shutterstock Da Unternehmen Cybersicherheit in ihre GRC (Governance, Risk & Compliance)-Prozesse integrieren, müssen […]

Microsoft fixes Windows 10 update flaw

It didn’t take long for some IT leaders who last month started paying to get Windows […]

5 key ways attack surface management will evolve in 2026

Cyberattack surfaces in the enterprise have been expanding in both extent and complexity for several years […]

KI-gesteuerter Cyberangriff sorgt für Wirbel

Forscher wollen den ersten großangelegten Cyberangriff entdeckt haben, der von einem KI-Modell ausgeführt wurde. LALAKA – […]

Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security

The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI and several international partners, has […]

North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes

North Korea-linked Contagious Interview campaign is now luring developers with trojanized coding tasks and pulling obfuscated […]

India’s new data privacy rules turn privacy compliance into an engineering challenge

India has notified its Digital Personal Data Protection (DPDP) Rules, 2025, introducing strict consent and data […]

Gipfel in Berlin – Europa strebt digitale Souveränität an

Am 18. November 2025 findet der Summit on European Digital Sovereignty in Berlin statt. mr_tigga – shutterstock.com […]

The rise of the chief trust officer: Where does the CISO fit?

CISOs may soon find themselves operating alongside a new colleague, the chief trust officer, as more […]

ISO and ISMS: 9 reasons security certifications go wrong

ISO certifications, as well as the implementation of an Information Security Management System (ISMS) based on IT […]

1 2 3 280