Cybersicherheit für viele Nebensache
Laut einer Umfrage informieren sich lediglich 54 Prozent der Deutschen regelmäßig über das Thema Cybersicherheit. Summit […]
How CISOs can prepare for the new era of short-lived TLS certificates
For years, organizations used SSL/TLS certificates with long lifespans, reviewing and renewing them only occasionally. That […]
Looking Ahead: 2026 Privacy & Security Trends
Trends toward a digital-first enterprise have already entered watershed data privacy and security in 2026. New […]
Security-Tools für KI-Infrastrukturen – ein Kaufratgeber
Tools, die die KI-Infrastruktur unter die Lupe nehmen, optimieren und absichern, liegen im Trend. Unser Ratgeber […]
Newly discovered malicious extensions could be lurking in enterprise browsers
A sprawling surveillance campaign targeting Google Chrome and Microsoft Edge users is just the latest evolution […]
CSO 30 Awards 2025: Celebrating Excellence, Innovation and Leadership in Cybersecurity
With submissions showcasing advances in automation, inclusion, workforce development, and real-world resilience, this year’s programme highlights the multifaceted role […]
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race
While most cybersecurity companies pour resources into AI models, massive compute, hoovering up all the data, […]
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise security: AI […]
Vaillant-CISO: “Starten statt Warten”
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?quality=50&strip=all 3543w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
Key questions CISOs must ask before adopting AI-enabled cyber solutions
Adversaries are hijacking AI technology for their own purposes, generating deepfakes, creating clever phishing lures, and […]