Don't let mistakes bother you

If you don't care, you may become a victim of spam

EU’s answer to CVE solves dependency issue, adds fragmentation risks

The security community has offered broad support for the creation of an EU-hosted vulnerability database as […]

Reports of GDPR violations have risen sharply

According to a recent report by law firm DLA Piper, organizations are increasingly being reported for violations of […]

Kritik am Kritis-Dachgesetz: “Flickenteppich” befürchtet

srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=150%2C84&quality=50&strip=all 150w, […]

NIST’s AI guidance pushes cybersecurity boundaries

For years, US cybersecurity guidance rested on a reassuring premise: New technologies introduce new wrinkles, but […]

Designing an End-to-End Data Protection Architecture

In a period characterized by the acceleration of digital faster, more regulatory bodies and constant cyber […]

10 Anzeichen für einen schlechten CSO

Sind IT-Mitarbeiter unzufrieden, kann das an schlechten Führungskräften oder an einer unzureichenden IT-Strategie liegen. Foto: fizkes […]

SolarWinds, again: Critical RCE bugs reopen old wounds for enterprise security teams

SolarWinds is yet again disclosing security vulnerabilities in one of its widely-used products. The company has released […]

Crooks are hijacking and reselling AI infrastructure: Report

For years, CSOs have worried about their IT infrastructure being used for unauthorized cryptomining. Now, say […]

Critical bug in popular vm2 Node.js sandboxing library puts projects at risk

A critical vulnerability has been patched in vm2, a widely used library for the Node.js JavaScript […]

Palo Alto unveils Quantum-Safe Security to mitigate cryptographic risk

Palo Alto Networks unveiled its Quantum-Safe Security solution at the company’s virtual Quantum-Safe Summit Tuesday. The […]

1 49 50 51 52 53 374