
Enhance Microsoft security by ditching your hybrid setup for Entra-only join
Artificial intelligence is top of mind for nearly everything Microsoft is doing these days, but there’s […]

Russia fires its biggest cyberweapon against Ukraine
Ukraine has faced one of the most severe cyberattacks in recent history, targeting its state registries […]

Die 10 besten API-Security-Tools
Mithilfe von APIs können verschiedene Software-Komponenten und -Ressourcen miteinander interagieren. Foto: eamesBot – shutterstock.com Anwendungsprogrammierschnittstellen (Application […]

From reactive to proactive: Redefining incident response with unified, cloud-native XDR
In today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The […]

US eyes ban on TP-Link routers amid cybersecurity concerns
The US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for […]

So entgiften Sie Ihre Sicherheitskultur
Lassen Sie toxische Kulturen nicht gedeihen. ON-Photography Germany | shutterstock.com Eine positive Cybersecurity-Kultur trägt zur allgemeinen […]

Top security solutions being piloted today — and how to do it right
Ask almost any CISO and they will tell you the security landscape just keeps getting more […]

Die 10 häufigsten LLM-Schwachstellen
Diese Schwachstellen sollten Sie kennen, damit Ihnen Ihr Large Language Model nicht um die Ohren fliegt. […]

Sehr geehrter CEO,
Mit einem offenen Brief appelliert CISO-Veteran Tyler Farrar an die CEOs dieser Welt. fizkes | shutterstock.com […]

European authorities say AI can use personal data without consent for training
The European Data Protection Board (EDPB) issued a wide-ranging report on Wednesday exploring the many complexities […]