CISA gives federal agencies 18 months to purge unsupported edge devices
The Cybersecurity and Infrastructure Security Agency has given federal agencies 18 months to remove all end-of-support […]
Zscaler extends zero-trust security to browsers with SquareX acquisition
Cloud security company Zscaler has announced the acquisition of SquareX, a Singapore-based browser detection and response […]
KI als AWS-Angriffsturbo
Kriminelle Hacker haben ihre Angriffe auf AWS-Umgebungen mit KI beschleunigt. khunkornStudio – shutterstock.com Forscher des Sicherheitsanbieters […]
The blind spot every CISO must see: Loyalty
The longstanding assumption that tenure, performance metrics, or expressed commitment serve as reliable indicators of the […]
Industry-Aligned Cryptography by CryptoBind
Cryptography has become the invisible infrastructure of the digital economy. Every payment, every identity, every medical […]
Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen
Mit der Zunahme von Cyberbedrohungen steigt auch die Zahl der Compliance-Rahmenwerke. So können CISOs diese Herausforderung […]
Four new vulnerabilities found in Ingress NGINX
Four security vulnerabilities have been found in the open source Ingress NGINX traffic controller that is […]
New APT group breached gov and critical infrastructure orgs in 37 countries
A new cyberespionage group that operates out of Asia has compromised 70 government and critical infrastructure […]
Substack data breach leaks users’ email addresses and phone numbers
Substack, a high-profile publishing platform widely used by academics, journalists, subject matter experts, and controversialists, has […]
Hybrid Network Security in 2026: Key Challenges, Risks, and Best Practices
Key Takeaways Hybrid network security is challenging because visibility, policies, and controls often differ across on‑prem, […]