Globale und regionale Unterschiede in Cyber-Strategien
KI und Investitionen in Cyber Security im Vergleich DACH vs. Global Quelle: Shutterstock Shutterstock – Aleksandar Malivuk Cyber Security rückt insbesondere in Deutschland mehr und mehr in den Fokus...
View ArticleSophos to acquire rival Secureworks in $859 million deal
Security provider Sophos has announced it intends to acquire Secureworks for around $859 million. The deal will be settled in cash. Secureworks shareholders will receive $8.50 per share, which...
View ArticleCISOs have to get on top of AI technologies, warns Microsoft
CISOs have to get on top of artificial intelligence technologies to defend their organizations, because threat actors are already using generative AI (genAI) to create malware, better phishing lures...
View ArticlePositiv denken für Sicherheitsentscheider: 6 Mindsets, die Sie sofort ablegen...
In einem falschen Security-Mindset gefangen? Foto: Paul Craft – shutterstock.comDass Jobs im Bereich Cybersecurity ein hohes Burnout-Potenzial aufweisen, ist längst kein Geheimnis mehr: Das Umfeld von...
View ArticleHow Interpol is adapting to the ever-evolving cybercrime landscape
With 100 years of history, Interpol is the police organization par excellence, bringing together 196 countries in the fight against crime. But in this century, crime has undergone a transformation,...
View ArticleChange Healthcare data breach exposed ‘only’ 100 million US health records
Personal health information of 100 million individuals was stolen during the February ransomware attack on Change Healthcare, a unit of UnitedHealth, the US health department has revealed. The...
View ArticlePredictable AWS cloud deployment resources allow full account takeover
Amazon Web Services (AWS) is urging its open-source Cloud Development Kit (CDK) users to apply fixes now available for a flaw that, under certain circumstances, can allow complete account takeover....
View ArticleRund 15 Millionen gehackte Konten in Deutschland
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2440464973.jpg?quality=50&strip=all 6000w,...
View ArticleCyber Risk Assessments: Risikobewertung hilft CISOs
Mit Hilfe von Cyber Risk Assessments können CISOs nicht nur das konkrete Risiko im Unternehmen ermitteln, sondern auch den Erfolg ihrer Arbeit sichtbar machen. Foto: Elnur – shutterstock.comAb einem...
View Article77% of CISOs fear next big breach will get them fired
When security vendor Portnox reported in a survey that 77% of CISOs say they are either very or extremely worried about losing their job when the next big breach happens, it raised questions about how...
View ArticleThe 10 biggest issues CISOs and cyber teams face today
To outsiders, the CISO role may seem straightforward: Secure the tech stack. But CISOs know that their job, which in its earliest days may have been narrow in scope, now comprises a huge array of...
View ArticlePatched SonicWall critical vulnerability still used in several ransomware...
A critical access control vulnerability affecting SonicWall’s SonicOS network access solutions, SSLVPN, and management access, is being excessively exploited by ransomware affiliates for breaching...
View ArticleBlack Basta greift über MS-Teams-Chats an
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_1719459637.jpg?quality=50&strip=all 4500w,...
View ArticleDelta gets serious and sues CrowdStrike
The dispute between Delta Airlines and CrowdStrike is entering the hot phase: The airline sued the cybersecurity company CrowdStrike in Fulton County Superior Court in the US state of Georgia on...
View ArticleSecurity researchers circumvent Microsoft Azure AI Content Safety
Security researchers at Mindgard have uncovered two security vulnerabilities in Azure AI Content Safety, Microsoft’s filter system for its AI platform. The vulnerabilities create a potential means for...
View ArticleAnti-Mitarbeiterbindung: Was toxische CISOs anrichten
Toxische Führung kennt viele Ausformungen und kann drastische Konsequenzen nach sich ziehen – speziell im IT-Security-Umfeld. Foto: CNGPICTURES | shutterstock.comFür Keith, einen erfahrenen...
View ArticleSecurity outsourcing on the rise as CISOs seek cyber relief
Security software and services spending is growing faster than staffing budgets, recasting security leaders in the role of quantity surveyors rather than builders of enterprise security. Gartner...
View Article5 cybersecurity issues at stake in next week’s US election
As the US heads into a historic election, with a deadlocked electorate facing a choice between two radically different presidential candidates, several cybersecurity matters could be determined by who...
View ArticleAtende refused to pay the ransom, and now pays the price
“The fight against cybercrime will be successful if criminals become convinced that the only consequence of their actions can be punishment and not profiting from crime,” reads the notice on the...
View ArticleSecuriti to help businesses build secure, compliant Gen AI with a new tool
Cybersecurity solutions provider Securiti has rolled out a new tool, Gencore AI, to help enterprises build generative AI systems, co-pilots, and AI agents. The solution, according to Securiti, borrows...
View Article