5 key ways attack surface management will evolve in 2026
Cyberattack surfaces in the enterprise have been expanding in both extent and complexity for several years […]
KI-gesteuerter Cyberangriff sorgt für Wirbel
Forscher wollen den ersten großangelegten Cyberangriff entdeckt haben, der von einem KI-Modell ausgeführt wurde. LALAKA – […]
Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security
The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI and several international partners, has […]
North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes
North Korea-linked Contagious Interview campaign is now luring developers with trojanized coding tasks and pulling obfuscated […]
India’s new data privacy rules turn privacy compliance into an engineering challenge
India has notified its Digital Personal Data Protection (DPDP) Rules, 2025, introducing strict consent and data […]
Gipfel in Berlin – Europa strebt digitale Souveränität an
Am 18. November 2025 findet der Summit on European Digital Sovereignty in Berlin statt. mr_tigga – shutterstock.com […]
The rise of the chief trust officer: Where does the CISO fit?
CISOs may soon find themselves operating alongside a new colleague, the chief trust officer, as more […]
ISO and ISMS: 9 reasons security certifications go wrong
ISO certifications, as well as the implementation of an Information Security Management System (ISMS) based on IT […]
Empathie trifft IT-Sicherheit: Der Weg zu gelebter Compliance
CISOs sollten Sicherheitsrichtlinien mit Blick auf die Belegschaft gestalten. earthphotostock – shutterstock.com In vielen Unternehmen stoßen […]
Was ist Social Engineering?
Mit Social-Engineering-Techniken manipulieren Cyberkriminelle die menschliche Psyche. Lesen Sie, wie das funktioniert und wie Sie sich […]