
BSI-Doppelstrategie für digitale Souveränität
width=”4743″ height=”2667″ sizes=”auto, (max-width: 4743px) 100vw, 4743px”>BSI-Präsidentin Claudia Plattner: “Je mehr vertrauenswürdige Produkte verfügbar sind, desto […]

83% of CISOs say staff shortage is major issue for defense
Most enterprise CISOs can’t remember a time when there wasn’ta cybersecurity talent shortage, but a new […]

How AI is reshaping cybersecurity operations
Generative AI has become a pervasive tool in the enterprise. According to a recent Boston Consulting […]
Top 5 Cyber Threats Facing Semiconductor Manufacturing
The semiconductor industry is at the epicentre of modern innovation, yet it is also a very […]

6 wichtige Punkte für Ihren Incident Response Plan
Lesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind. PeopleImages.com – Yuri A – Shutterstock.com […]

Hunt Evil Your Practical Guide to Threat Hunting – Part 1
You might have heard a lot of buzz around this topic of “Threat Hunting” and want […]
New Front in Cyber Espionage: Chinese Hackers and AI Agents Target Global Cloud and Telecom Infrastructure
A perfect storm is brewing in cyberspace as sophisticated Chinese state-sponsored actors escalate attacks on cloud […]

Disgruntled developer gets four-year sentence for revenge attack on employer’s network
A software developer who launched disruptive logic bombs inside his employer’s network as an act of […]

Cyberangriff auf Colt: Support-Systeme nach Lösegelddrohung offline
Der TK-Konzern Colt kämpft seit einer Woche mit den Folgen einer Ransomware-Attacke. A9 STUDIO – shutterstock.com […]

Cyberangriff auf Versicherungsmakler BüchnerBarella
Die Versicherungsbranche ist ein attraktives Ziel für Cyberkriminelle. Jetzt hat es den deutschen Versicherungsmakler BüchnerBarella getroffen. […]