HP launches TPM Guard to help defeat physical TPM attacks
The Trusted Platform Module (TPM), developed by the Trusted Computing Group (TCG), is a mandatory security […]
New ‘StoatWaffle’ malware auto‑executes attacks on developers
A newly disclosed malware strain dubbed “StoatWaffle” is giving fresh teeth to the notorious, developer-targeting “Contagious […]
Autonomous AI adoption is on the rise, but it’s risky
Two AI releases early this year are prompting users to give up control and let autonomous […]
Streamline physical security to enable data center growth in the era of AI
AI is the new space race for data centers, and consistency at speed is the rocket […]
Why CISOs should embrace AI honeypots
The nightmare begins with our protagonist trying to find a way inside to get to the […]
Building Multi-Tenant Crypto for SaaS Platforms
Cryptographic architecture has emerged as a characteristic of platform trust as SaaS platforms keep scaling across […]
ISO und ISMS: Darum gehen Security-Zertifizierungen schief
Mit einer ISO 27001-Zertifizierung weisen Unternehmen nach, dass sie ein wirksames Informationssicherheits-Managementsystems (ISMS) betreiben. Lesen Sie, […]
Palo Alto updates security platform to discover AI agents
As CISOs worry about AI agent sprawl, Palo Alto Networks has announced an update to its […]
How Can Organizations Perform Hybrid Infrastructure Risk Assessment Effectively?
Key Takeaways Hybrid Infrastructure Risk Assessment helps organizations identify security gaps across cloud and on-premise environments. […]
Faster attacks and ‘recovery denial’ ransomware reshape threat landscape
Mandiant’s M-Trends 2026 report, released today at the RSA Conference, shows that attackers are moving faster, […]