The 2 faces of AI: How emerging models empower and endanger cybersecurity
In my long career of safeguarding digital assets, I’ve seen technology shifts come and go, but […]
Cybersecurity at the edge: Securing rugged IoT in mission-critical environments
Edge computing is no longer a futuristic concept; it’s a reality shaping mission-critical operations across defense, […]
Phishing-Angreifer setzen vermehrt auf E-Mail-Routing-Lücken
Angreifer missbrauchen falsch konfigurierte Richtlinien, um Phishing-E-Mails wie interne E-Mails aussehen zu lassen, Filter zu umgehen […]
8 Strategies to Improve Cloud Visibility for Better Monitoring in 2026
Key Takeaways Improving cloud visibility requires a unified view of your assets, identities, configurations, and data […]
NIS2-Umsetzung: Neues BSI-Portal geht an den Start
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?quality=50&strip=all 7500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
Critical jsPDF vulnerability enables arbitrary file read in Node.js deployments
A now-fixed critical flaw in the jsPDF library could enable attackers to extract sensitive files from […]
Cryptography vs Security Theatre
In many organizations, security looks strong on paper. Policies are documented, audits are passed, and compliance […]
Top cyber threats to your AI systems and infrastructure
Attacks against AI systems and infrastructure are beginning to take shape in real-world instances, and security […]
Die wichtigsten CISO-Trends für 2026
Lesen Sie, vor welchen Herausforderungen CISOs mit Blick auf das Jahr 2026 stehen. SuPatMaN – shutterstock.com […]
Holes in Veeam Backup suite allow remote code execution, creation of malicious backup config files
Veeam says that four vulnerabilities could allow a person with certain oversight roles for its flagship […]