Don't let mistakes bother you

If you don't care, you may become a victim of spam

10 Kennzahlen, die CISOs weiterbringen

Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.com […]

That innocent PDF is now a Trojan Horse for Gmail attacks

Enterprise users know by now that they shouldn’t click on suspicious-looking links or download strange files. […]

That innocent PDF is now a Trojan Horse for Gmail attacks

Enterprise users know by now that they shouldn’t click on suspicious-looking links or download strange files. […]

Chinese APT group Phantom Taurus targets gov and telecom organizations

Researchers have documented a previously unknown threat actor that aligns with China’s intelligence collection interests. The […]

Anthropic Just Changed the Rules for Working With AI

Anthropic just dropped a guide on “effective context engineering,” and the headline point is this: “Stop […]

How OpenAI Trained to Beat the World’s Best Coders: Interview With Research Lead Ahmed El-Kishky

OpenAI and Google DeepMind stood out at the International Collegiate Programming Contest world finals in Baku, […]

Microsoft plots new path for Sentinel, adding agentic AI features

Microsoft has announced a raft of new AI features for Sentinel SIEM and Security Copilot as […]

OpenAI’s Sora 2 Lets You Put Yourself in an AI-Generated Video

OpenAI has released Sora 2, its new and improved video generation model. The standout feature is […]

Cyber-Bedrohungslage in der EU verschärft sich

Ransomware liegt weiter im Trend bei Cyberkriminellen. Studio-M – shutterstock.com Die Bedrohungslage für Europas digitale Infrastruktur […]

Spotlight report: Securing the cloud

Download the October 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

1 2 3 244