Sehr geehrter CEO,
Mit einem offenen Brief appelliert CISO-Veteran Tyler Farrar an die CEOs dieser Welt.fizkes | shutterstock.com Nie stand mehr auf dem Spiel. Jede Woche machen neue Cybersicherheitsvorfälle...
View ArticleDie 10 häufigsten LLM-Schwachstellen
Diese Schwachstellen sollten Sie kennen, damit Ihnen Ihr Large Language Model nicht um die Ohren fliegt. VectorMine | shutterstock.com Das Open Worldwide Application Security Project (OWASP) hat seine...
View ArticleTop security solutions being piloted today — and how to do it right
Ask almost any CISO and they will tell you the security landscape just keeps getting more complex. New products arise, technology categories blur, vendors gobble up competitors or venture into...
View ArticleSo entgiften Sie Ihre Sicherheitskultur
Lassen Sie toxische Kulturen nicht gedeihen.ON-Photography Germany | shutterstock.com Eine positive Cybersecurity-Kultur trägt zur allgemeinen Awareness bei, ist Best Practices förderlich und kann die...
View ArticleUS eyes ban on TP-Link routers amid cybersecurity concerns
The US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for American homes and small businesses, amid concerns about national security risks. Reports suggest...
View ArticleFrom reactive to proactive: Redefining incident response with unified,...
In today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The average security operations center (SOC) team receives 4,484 alerts every day and can spend up to 3...
View ArticleDie 10 besten API-Security-Tools
Mithilfe von APIs können verschiedene Software-Komponenten und -Ressourcen miteinander interagieren. Foto: eamesBot – shutterstock.comAnwendungsprogrammierschnittstellen (Application Programming...
View ArticleRussia fires its biggest cyberweapon against Ukraine
Ukraine has faced one of the most severe cyberattacks in recent history, targeting its state registries and temporarily disrupting access to critical government records. Ukrainian Deputy Prime...
View ArticleEnhance Microsoft security by ditching your hybrid setup for Entra-only join
Artificial intelligence is top of mind for nearly everything Microsoft is doing these days, but there’s another goal the company would like to see its users strive to attain — one that may not be...
View ArticleUS order is a reminder that cloud platforms aren’t secure out of the box
This week’s binding directive to US government departments to implement secure configurations in cloud applications, starting with Microsoft 365 (M365), is a reminder to all CISOs that cloud...
View Article4 Wege zu neuer Cyberabwehrstärke
Generative AI kann traditionellen Sicherheitsmaßnahmen neuen “Schwung” verleihen. Henri Studios | shutterstock.com Von Smartphones und Wearables über IoT-Geräte bis hin zu Cloud-Infrastrukturen – die...
View ArticleTop 7 zero-day exploitation trends of 2024
Zero-day vulnerabilities saw big growth once again in 2024. With no patch available, zero-day flaws give attackers a significant jump on cybersecurity defense teams, making them a critical weapon for...
View ArticleHacker knacken das Smart Home
loading="lazy" width="400px">Im Smart Home werkeln immer mehr Devices mit Internet-Anschluss – für Hacker ein lohnendes Ziel.Andrey Suslov – shutterstock.com IoT-Geräte wie digitale Bilderrahmen...
View Article7 biggest cybersecurity stories of 2024
Cybersecurity headlines were plenty this year, with several breaches, attacks, and mishaps drawing worldwide attention. But a few incidents in particular had far-reaching consequences, with the...
View ArticleThe 2024 cyberwar playbook: Tricks used by nation-state actors
In 2024, nation-state cyber activity was off the charts, with Chinese, Russian, and Iranian actors leading the charge. Their campaigns weren’t just relentless — they were innovative, using a crafty...
View Article10 essenzielle Maßnahmen für physische Sicherheit
Wenn physische Security nur immer so simpel umzusetzen wäre… Foto: Leremy | shutterstock.comObwohl CISOs im Allgemeinen eher selten mit dem gesamten Spektrum der Gesundheits- und...
View ArticleHow are you securing your communications in the wake of the Volt Typhoon...
The FBI recently released information that text messages between Apple and Android texting systems were insecure and that attackers could listen in and access those communications, more fallout from...
View ArticleNetwork problems delay flights at two oneworld Alliance airlines
IT problems struck flights at two oneworld Alliance member airlines this week, leading to delays and flight cancellations. Network equipment connecting internal and external systems at Japan Airlines...
View ArticleSecurity-Awareness-Trainings – ein Ratgeber
Wenn Ihre erste Verteidigungslinie fällt, haben Cyberschurken leichtes Spiel.Leremy | shutterstock.com Security-Awareness-Schulungen sind für Unternehmen und Organisationen obligatorisch und sollten...
View ArticleData protection challenges abound as volumes surge and threats evolve
In the global digital economy, data is the most important asset organizations must protect from theft and damage. CISOs are fundamentally guardians of that asset, obligated to keep it secure and...
View Article