
4 Wege zu neuer Cyberabwehrstärke
Generative AI kann traditionellen Sicherheitsmaßnahmen neuen “Schwung” verleihen. Henri Studios | shutterstock.com Von Smartphones und Wearables […]

US order is a reminder that cloud platforms aren’t secure out of the box
This week’s binding directive to US government departments to implement secure configurations in cloud applications, starting […]

Enhance Microsoft security by ditching your hybrid setup for Entra-only join
Artificial intelligence is top of mind for nearly everything Microsoft is doing these days, but there’s […]

Russia fires its biggest cyberweapon against Ukraine
Ukraine has faced one of the most severe cyberattacks in recent history, targeting its state registries […]

Die 10 besten API-Security-Tools
Mithilfe von APIs können verschiedene Software-Komponenten und -Ressourcen miteinander interagieren. Foto: eamesBot – shutterstock.com Anwendungsprogrammierschnittstellen (Application […]

From reactive to proactive: Redefining incident response with unified, cloud-native XDR
In today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The […]

US eyes ban on TP-Link routers amid cybersecurity concerns
The US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for […]

So entgiften Sie Ihre Sicherheitskultur
Lassen Sie toxische Kulturen nicht gedeihen. ON-Photography Germany | shutterstock.com Eine positive Cybersecurity-Kultur trägt zur allgemeinen […]

Top security solutions being piloted today — and how to do it right
Ask almost any CISO and they will tell you the security landscape just keeps getting more […]

Die 10 häufigsten LLM-Schwachstellen
Diese Schwachstellen sollten Sie kennen, damit Ihnen Ihr Large Language Model nicht um die Ohren fliegt. […]