
Game changer: How AI simplifies implementation of Zero Trust security objectives
As enterprises increasingly move workloads to private cloud for reasons such as performance and compliance and […]

Palo Alto Networks to buy CyberArk for $25B as identity security takes center stage
Palo Alto Networks is making what could be its biggest bet yet by agreeing to buy […]

Erneuter Hackerangriff bei Orange
width=”2470″ height=”1389″ sizes=”(max-width: 2470px) 100vw, 2470px”> Nachdem bereits im Februar die rumänische Niederlassung gehackt wurde, geriet […]

Dobrindt prüft Einsatz von US-Software Palantir
Kann sich den Einsatz von Palantir vorstellen: Bundesinnenminister Dobrindt hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) […]

Ransomware upstart Gunra goes cross-platform with encryption upgrades
A new Linux variant of the “Gunra” ransomware family has been identified with highly configurable multithreading, […]

Palo Alto Networks eyes $20B CyberArk deal as identity security takes center stage
Palo Alto Networks is closing in on what could be its biggest bet yet: a more […]

Breaking Down Credential Phishing Trends: How Can NDR Help?
Cybercriminals have changed tactics. Credential phishing has overtaken ransomware as the most common way to breach […]

Prepping for the quantum threat requires a phased approach to crypto agility
Enterprises need to act now to address the threats future quantum computing advances pose to current […]

How CISOs can scale down without compromising security
Years ago, David Mahdi, now a CISO advisor at Transmit Security, found himself in a situation […]

MCP‑Sicherheit: Das Rückgrat von Agentic AI sichern
Im Zuge von Agentic AI sollten sich CISOs mit MCP-Sicherheit auseinandersetzen. Wanan Wanan – shutterstock.com Das […]