
Cyber-Bedrohungslage in der EU verschärft sich
Ransomware liegt weiter im Trend bei Cyberkriminellen. Studio-M – shutterstock.com Die Bedrohungslage für Europas digitale Infrastruktur […]

Spotlight report: Securing the cloud
Download the October 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

CISOs advised to rethink vulnerability management as exploits sharply rise
Enterprise attack surfaces continue to expand rapidly, with more than 20,000 new vulnerabilities disclosed in the […]

Government shutdown deepens US cyber risk, exposing networks to threat actors
At midnight on Sept. 30, the US government shut down for the first time since 2018, […]
DPDP: Powering Trusted Finance in 2025
DPDP Act 2023 has brought a new chapter to data privacy in India. In the case […]

CISA 2015 cyber threat info-sharing law lapses amid government shutdown
Ten years ago, Congress passed a major cybersecurity bill called the Cybersecurity Information Sharing Act of […]

Wie CISOs schlechte Produkte enttarnen
Drum prüfe… Ground Picture | shutterstock.com Security-Anbietern stehen viele Wege offen, um CISOs und Sicherheitsentscheider mit […]

Don’t drink or drive, say cyberattackers
When cybercriminals can shut down both a luxury carmaker and a major beer producer in the […]

Threat actors could retrieve valid usernames from VMware by exploiting vulnerabilities
Three new vulnerabilities have been found in critical VMware products, including two that could be used […]
OpenAI’s Sora 2 Will Not Recreate Your Copyrighted Character – If You Opt Out
Creators will need to opt out of having their copyrighted character or other work recreated by […]