The Hidden Costs of Not Using HSMs in Regulated Sectors
In regulated sectors such as banking, healthcare, and government services, the importance of safeguarding sensitive data […]

CNAPP buyer’s guide: Top cloud-native app protection platforms compared
Cloud security continues to be a vexing situation, and the tool set continues to become more […]

The state of cyberwar in Ukraine — and how CISOs can help
Earlier this month my researcher Barbara Schluetter and I had the pleasure of attending the Kyiv […]

Die besten Cyber-Recovery-Lösungen
Nicht greifende Recovery-Prozesse sind für Unternehmen ein Albtraumszenario, das dank ausgefeilter Angriffe immer öfter zur Realität […]

Chinese APT Billbug deploys new malware toolset in attack on multiple sectors
Chinese cyberespionage group Billbug has revamped its attack toolkit with new malware payloads in a wide-reaching […]
Eliminating Security Blind Spots and Closing Security Gaps with Fidelis Elevate
The Challenge: Security Blind Spots in Modern IT Environments Digital transformation has expanded IT environments beyond […]

Phishing-Kampagne lockt mit russischem Wein
Von Wein zu Trauben: Neue Wineloader-Variante Grapeloader entdeckt. Red Kalf Creatives – shutterstock Die russische Hackergruppe […]

North Korea-backed Kimsuky targets unpatched BlueKeep systems in new campaign
The infamous BlueKeep flaw from 2019, tracked as CVE-2019-0708, has come back to haunt security professionals […]

Security leaders shed light on their zero trust journeys
Zero trust has become a bellwether for access management across the security industry. But while security […]

Generative AI is making pen-test vulnerability remediation much worse
Technical, organizational, and cultural factors are preventing enterprises from resolving vulnerabilities uncovered in penetration tests — […]