Don't let mistakes bother you

If you don't care, you may become a victim of spam

US cybersecurity weakened by congressional delays despite Plankey renomination

The White House moved to restart an urgent stalled priority by renominating well-regarded Coast Guard and […]

Cybercrime Inc.: When hackers are better organized than IT

What once began in forums with self-written malware has evolved into a globally networked underground economy […]

January 2026 Microsoft Patch Tuesday: Actively exploited zero day needs attention

Eight critical vulnerabilities and an actively exploited zero day highlight Microsoft’s first Patch Tuesday announcements for […]

Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum

Cybersecurity risk will accelerate this year, fueled by advances in AI, deepening geopolitical fragmentation and the […]

Top 5 Enterprise Cloud Security Solutions to Consider in 2026

Key Takeaways Enterprise cloud security in 2026 requires platform-level solutions—not isolated tools—because risks now span multi-cloud, […]

Ransomware-Banden erpressen Opfer mit Compliance-Verstößen

Ransomware-Gruppen setzen ihre Opfer vermehrt mit Compliance-Verstößen unter Druck. Digitala World – shutterstock.com Ransomware-Attacken zählen nach […]

High-severity bug in Broadcom software enables easy WiFi denial-of-service

A high-severity flaw in Broadcom WiFi chipset software can allow an attacker within radio range to […]

For application security: SCA, SAST, DAST and MAST. What next?

I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that […]

Top 10 vendors for AI-enabled security — according to CISOs

Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be […]

The Real Cost of a Data Breach: Why Data Protection Is Now a Boardroom Priority

Organizations will start and possibly end with regulatory fines when discussing the cost of data breach. Although the fines […]

1 2 3 317