Implementing zero trust in AI and LLM architectures: A practitioner’s guide...
In the rapidly evolving landscape of artificial intelligence (AI) and large language models (LLMs), security can no longer be an afterthought. Implementing robust security measures is paramount as...
View ArticleHacker brüsten sich mit gestohlenen Destatis-Daten
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2206522337.jpg?quality=50&strip=all 4000w,...
View ArticleOvercome fragmented cloud security operations with unified XDR and SIEM
As any security practitioner can attest, it takes many resources and a great deal of manpower to protect dynamic hybrid and multicloud environments. Today, the average organization deploys anywhere...
View ArticleGenAI-Security als Checkliste
Das Open Web Application Security Project (OWASP) gibt Unternehmen eine Checkliste für (mehr) GenAI-Sicherheit an die Hand. Foto: Gannvector | shutterstock.comWährend Unternehmen wie OpenAI,...
View ArticleSecurity awareness training: Topics, best practices, costs, free options
What is security awareness training? Security awareness training is a cybersecurity program that aims to educate everyone in an organization about potential cyber threats, as well as actions they can...
View ArticleDatenpanne bei Tibber: 50.000 deutsche Kunden betroffen
Hacker sind in das System des Stromanbieters Tribber eingedrungen. Black_Kira – Shutterstock.com Der deutsche Standort des norwegischen Stromanbieters Tibber wurde kürzlich von Hackern angegriffen....
View ArticleCISOs who delayed patching Palo Alto vulnerabilities now face real threat
Two of six critical vulnerabilities in Palo Alto Networks’ Expedition Migration tool, which the company patched in October, are being actively exploited according to the US Cybersecurity and...
View ArticleMisconfigurations can cause many Microsoft Power Pages sites to expose...
Many websites built with Microsoft Power Pages expose sensitive information from their databases due to a poor understanding of access control configurations and default settings, according to a...
View Article10 Kennzahlen, die CISOs weiterbringen
Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.comDie Security-Performance zu messen, gehört vielleicht nicht zu den...
View ArticleSo, you don’t have a chief information security officer? 9 signs your company...
The threat of cyberattacks keeps many US CEOs awake at night, but fewer than half of them have a CISO to check under their company’s bed for digital monsters. Cyber-attacks were ranked as the No. 2...
View ArticleWarum Ursachen für Security Breaches unbekannt bleiben
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2450604701.jpg?quality=50&strip=all 8256w,...
View ArticleMusk’s anticipated cost-cutting hacks could weaken American cybersecurity
Donald Trump has named loyalist and the richest man in the world, Elon Musk, along with former presidential candidate Vivek Ramaswamy, to spearhead an initiative called the Department of Government...
View ArticleDas gehört in Ihr Security-Toolset
Lesen Sie, welche Werkzeuge essenziell sind, um Unternehmen gegen Cybergefahren abzusichern.Gorodenkoff | shutterstock.com Sicherheitsentscheider sind mit einer sich kontinuierlich verändernden...
View ArticleEDR buyer’s guide: How to pick the best endpoint detection and response solution
Endpoint detection and response (EDR) explained Endpoint detection and response (EDR) security software has grown in popularity and effectiveness as it allows security teams to quickly detect and...
View ArticleFord untersucht Hinweise auf Hackerangriff
In einem Hackerforum sind Daten aufgetaucht, die angeblich von Ford stammen.Matthew G Eddy – Shutterstock.com Ein Cyberkrimineller namens EnergyWeaponUser prahlt damit, kürzlich gemeinsam mit...
View ArticleFrom MFA mandates to locked-down devices, Microsoft posts a year of SFI...
During its Ignite conference on Tuesday, Microsoft shared a progress update on its Secure Future Initiative (SFI), introduced a year ago, which included significant measures such as enforcing...
View ArticleVerteidigungsminister Pistorius vermutet Sabotage
Bundesverteidigungsminister Boris Pistorius (SPD): “Niemand glaubt, dass diese Kabel aus Versehen durchtrennt worden sind.”Alexandros Michailidis – Shutterstock.com Bundesverteidigungsminister Boris...
View ArticleT-Mobile US von China gehackt
Erst hat die chinesische Hackergruppe Salt Typhoon Trumps Handy gehackt und jetzt T-Mobile USA. Chebakalex7/shutterstock.com Die Zahl der Cyberangriffe, insbesondere von staatlicher Seite, nimmt immer...
View ArticleAt Ignite, Microsoft looks to genAI, exposure managment, and new bug bounties...
Microsoft announced a host of new security measures at its annual Ignite conference, with the goal of strengthening its existing data protection, endpoint security, and extended threat detection and...
View ArticlePalo Alto Networks zero-day firewall flaws caused by basic dev mistakes
Palo Alto Networks has issued fixes for two actively exploited vulnerabilities that impact its firewalls and virtual security appliances. When combined, the flaws allow attackers to execute malicious...
View Article