Don't let mistakes bother you

If you don't care, you may become a victim of spam

Has CISO become the least desirable role in business?

After nine years as CSO and senior vice president of IT at Sumo Logic, George Gerchow […]

Skills gaps send CISOs in search of managed security providers

A shortage of skilled cybersecurity professionals, combined with budget cuts, is fueling growth in the managed […]

4 Wege aus der Security-Akronymhölle

Gefangen im Buchstabensud? mikeledray | shutterstock.com Vor seinen MAGA- und DOGE-Eskapaden wurde Elon Musk in erster […]

The Real Cost of Breaches: A Data-Driven Perspective

In our connected world today, data breaches pose a constant threat. Companies in every industry face […]

Verified, but vulnerable: Malicious extensions exploit IDE trust badges

Developers across popular integrated development environments (IDEs) like Visual Studio Code, Visual Studio, IntelliJ IDEA, and […]

Kritische Schwachstelle in Cisco Unified CM entdeckt

Bereits zum zweiten Mal in einer Woche muss Cisco eine Schwachstelle mit höchsten Schweregrad melden. JarTee […]

Dobrindt will mehr in Cybersicherheit investieren

Bundesinnenminister Alexander Dobrindt will den Schutz vor Cyberangriffen verstärken. hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) […]

Cybersecurity in the supply chain: strategies for managing fourth-party risks

Fourth-party vendors have become a serious supply chain cybersecurity blind spot. Unlike third parties with direct […]

Security-KPIs und -KRIs: So messen Sie Cybersicherheit

Cybersicherheit zu messen, ist kein Kinderspiel. Foto: Ultraskrip – shutterstock.com Eine wichtige Säule jedes ausgereiften Cyberrisk-Programms […]

Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang

Ransomware gang Hunters International says it’s shutting down its operations for unexplained reasons, and is offering […]

1 2 3 179