React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web
The React 19 library for building application interfaces was hit with a remote code vulnerability, React2Shell, about a […]
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]
Top 5 real-world AI security threats revealed in 2025
The year of agentic AI came with promises of massive productivity gains for businesses, but the […]
Data Retention & Automatic Erasure: How to Build a Compliant Workflow
In an era defined by the exponential expansion of digital footprints, organisations are under unprecedented pressure […]
Tipps für CISOs, die die Branche wechseln wollen
Tipps für CISOs mit “Vertical-Switch-Ambitionen”. FotoDax | shutterstock.com In der Außenperspektive sollte es für Menschen, die […]
5 Integrations that Make CNAPP Ideal for Cloud Environments
Key Takeaways CNAPPs unify CSPM, CWPP, and DSPM to secure multi-cloud environments across AWS, Azure, and […]
High severity flaw in MongoDB could allow memory leakage
Document database vendor MongoDB has advised customers to update immediately following the discovery of a flaw […]
7 SASE certifications to validate converged network and security skills
As cyberattacks grow more sophisticated and AI-powered threats escalate, enterprises are under pressure to evolve beyond […]
CERN: how does the international research institution manage risk?
There are few research institutions in the world with the size and scope of the European […]
Webrat turns GitHub PoCs into a malware trap
Security professionals hunting PoCs and exploit code on GitHub might soon walk into a trap, as […]