
32% of exploited vulnerabilities are now zero-days or 1-days
Patching windows for organizations keep shortening, as threat actors exploit important vulnerabilities increasingly faster. According to […]

Palo Alto kauft CyberArk
Der israelische Identity-Management-Anbieter CyberArk wird Teil von Palo Alto Networks. ShU studio | shutterstock.com Mit der […]

Game changer: How AI simplifies implementation of Zero Trust security objectives
As enterprises increasingly move workloads to private cloud for reasons such as performance and compliance and […]

Palo Alto Networks to buy CyberArk for $25B as identity security takes center stage
Palo Alto Networks is making what could be its biggest bet yet by agreeing to buy […]

Erneuter Hackerangriff bei Orange
width=”2470″ height=”1389″ sizes=”(max-width: 2470px) 100vw, 2470px”> Nachdem bereits im Februar die rumänische Niederlassung gehackt wurde, geriet […]

Dobrindt prüft Einsatz von US-Software Palantir
Kann sich den Einsatz von Palantir vorstellen: Bundesinnenminister Dobrindt hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) […]

Ransomware upstart Gunra goes cross-platform with encryption upgrades
A new Linux variant of the “Gunra” ransomware family has been identified with highly configurable multithreading, […]

Palo Alto Networks eyes $20B CyberArk deal as identity security takes center stage
Palo Alto Networks is closing in on what could be its biggest bet yet: a more […]

Breaking Down Credential Phishing Trends: How Can NDR Help?
Cybercriminals have changed tactics. Credential phishing has overtaken ransomware as the most common way to breach […]

How CISOs can scale down without compromising security
Years ago, David Mahdi, now a CISO advisor at Transmit Security, found himself in a situation […]