Ten career-ending mistakes CISOs make and how to avoid them
The Chief Information Security Officer role has become one of the most precarious positions in the […]
CISA gives federal agencies 18 months to purge unsupported edge devices
The Cybersecurity and Infrastructure Security Agency has given federal agencies 18 months to remove all end-of-support […]
Zscaler extends zero-trust security to browsers with SquareX acquisition
Cloud security company Zscaler has announced the acquisition of SquareX, a Singapore-based browser detection and response […]
KI als AWS-Angriffsturbo
Kriminelle Hacker haben ihre Angriffe auf AWS-Umgebungen mit KI beschleunigt. khunkornStudio – shutterstock.com Forscher des Sicherheitsanbieters […]
The blind spot every CISO must see: Loyalty
The longstanding assumption that tenure, performance metrics, or expressed commitment serve as reliable indicators of the […]
Industry-Aligned Cryptography by CryptoBind
Cryptography has become the invisible infrastructure of the digital economy. Every payment, every identity, every medical […]
Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen
Mit der Zunahme von Cyberbedrohungen steigt auch die Zahl der Compliance-Rahmenwerke. So können CISOs diese Herausforderung […]
Four new vulnerabilities found in Ingress NGINX
Four security vulnerabilities have been found in the open source Ingress NGINX traffic controller that is […]
New APT group breached gov and critical infrastructure orgs in 37 countries
A new cyberespionage group that operates out of Asia has compromised 70 government and critical infrastructure […]
Substack data breach leaks users’ email addresses and phone numbers
Substack, a high-profile publishing platform widely used by academics, journalists, subject matter experts, and controversialists, has […]