Don't let mistakes bother you

If you don't care, you may become a victim of spam

Dobrindt will mehr in Cybersicherheit investieren

Bundesinnenminister Alexander Dobrindt will den Schutz vor Cyberangriffen verstärken. hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) […]

Cybersecurity in the supply chain: strategies for managing fourth-party risks

Fourth-party vendors have become a serious supply chain cybersecurity blind spot. Unlike third parties with direct […]

Security-KPIs und -KRIs: So messen Sie Cybersicherheit

Cybersicherheit zu messen, ist kein Kinderspiel. Foto: Ultraskrip – shutterstock.com Eine wichtige Säule jedes ausgereiften Cyberrisk-Programms […]

Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang

Ransomware gang Hunters International says it’s shutting down its operations for unexplained reasons, and is offering […]

Endpoint Vulnerability Remediation: From Alert to Action Using EDR Tools

With the boom of cloud usage and AI, organizations have been facing an increase in cybersecurity […]

Hardcoded root credentials in Cisco Unified CM trigger max-severity alert

Cisco (Nasdaq:CSCO) has patched a max severity flaw in its Unified Communications Manager (Unified CM) and […]

Erneute Cyberattacke auf Internationalen Strafgerichtshof

Der Internationale Strafgerichtshof wurde bereists zum zweiten Mal von einer Cyberattacke getroffen. Nominesine – shutterstock.com Der […]

Why Compliance Alone Isn’t Enough: CryptoBind’s Vision

Compliance to industry standards and regulations is frequently considered the gold standard for data security in […]

Third-party risk management: How to avoid compliance disaster

Whether your organization is aware or not, it does relly on third-party services providers that help […]

Russland nutzt Medienplattform für Desinformation

Die Bundesregierung macht Russland für Desinformation im Netz verantwortlich. Skorzewiak – shutterstock.com Die Bundesregierung macht Russland […]

1 2 3 179