US cybersecurity weakened by congressional delays despite Plankey renomination
The White House moved to restart an urgent stalled priority by renominating well-regarded Coast Guard and […]
Cybercrime Inc.: When hackers are better organized than IT
What once began in forums with self-written malware has evolved into a globally networked underground economy […]
January 2026 Microsoft Patch Tuesday: Actively exploited zero day needs attention
Eight critical vulnerabilities and an actively exploited zero day highlight Microsoft’s first Patch Tuesday announcements for […]
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Cybersecurity risk will accelerate this year, fueled by advances in AI, deepening geopolitical fragmentation and the […]
Top 5 Enterprise Cloud Security Solutions to Consider in 2026
Key Takeaways Enterprise cloud security in 2026 requires platform-level solutions—not isolated tools—because risks now span multi-cloud, […]
Ransomware-Banden erpressen Opfer mit Compliance-Verstößen
Ransomware-Gruppen setzen ihre Opfer vermehrt mit Compliance-Verstößen unter Druck. Digitala World – shutterstock.com Ransomware-Attacken zählen nach […]
High-severity bug in Broadcom software enables easy WiFi denial-of-service
A high-severity flaw in Broadcom WiFi chipset software can allow an attacker within radio range to […]
For application security: SCA, SAST, DAST and MAST. What next?
I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that […]
Top 10 vendors for AI-enabled security — according to CISOs
Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be […]
The Real Cost of a Data Breach: Why Data Protection Is Now a Boardroom Priority
Organizations will start and possibly end with regulatory fines when discussing the cost of data breach. Although the fines […]