Brauchen Sie einen vCISO?
In komplexen Bedrohungslandschaften sicher bleiben, ohne das (Personal-)Budget zu sprengen? Das vCISO-Konzept stellt das in Aussicht.TippaPatt | shutterstock.com In der heutigen Digitallandschaft, die...
View ArticleThird Party Risk Management: So vermeiden Sie Compliance-Unheil
Third Party Risk Management hilft Unternehmen, das Risiko von Compliance-Verstößen zu vermeiden. Foto: Diyajyoti – shutterstock.comIn Zeiten der Digitalisierung ist es für Unternehmen unerlässlich,...
View ArticleBlown the cybersecurity budget? Here are 7 ways cyber pros can save money
It’s hard to find a CISO or cybersecurity leader who has the money they need to pay for all the work they want to do. A majority of CISOs (57%) said they expect to see an increase in their...
View ArticleVielen CISOs droht der Burnout
loading="lazy" width="400px">Wer seinen CISO verheizt, dem drohen noch mehr Cyberrisiken.Kaspars Grinvalds – shutterstock.com Mit der zunehmend komplexer werdenden Cyber-Bedrohungslage wächst der...
View ArticleTop 12 ways hackers broke into your systems in 2024
In 2024, hackers had a field day finding sneaky ways into systems — from convincing phishing scams that played on human curiosity to brutal software flaws that exposed gaps in tech upkeep. It was a...
View ArticleThe CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...
View ArticleUS Treasury Department workstations breached in attack attributed to China
The US Department of the Treasury revealed on Monday that an attacker was able to bypass security, access an undisclosed number of Treasury workstations, and steal “certain unclassified documents,” in...
View Article6 Mittel gegen Security-Tool-Wildwuchs
Viel hilft nicht immer viel. Foto: Roman Samborskyi | shutterstock.comAuf der Suche nach Möglichkeiten, sich vor ständig wachsenden Cyberbedrohungen zu schützen, erliegen nicht wenige Unternehmen...
View ArticleCISO – Traumjob oder eher Albtraum
loading="lazy" width="400px">Der CISO-Job kann auch zu einem Albtraum werden – gerade wenn die Unterstützung und das Budget fehlt.Toma Stepunina – shutterstock.com „Die Rolle des CISO (Chief...
View ArticleSquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before...
SquareX, an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported large-scale attacks targeting Chrome Extension...
View Article12 best entry-level cybersecurity certifications
A UC Berkeley professor recently made headlines when he stated that even his computer science graduates with a perfect 4.0 grade point average were failing to land jobs. Such is the labor market in...
View ArticleDownload our security orchestration, automation, and remediation (SOAR) tools...
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SOAR can do for their organizations and how to choose the right solution.
View ArticleDownload the Hot IT Certifications Enterprise Spotlight
Download the January 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.
View ArticleUS soldier linked to Trump call log hack arrested in Texas
Court documents unsealed Monday show that US authorities have arrested a 20-year-old soldier, Cameron John Wagenius, charged with two counts of selling or attempting to sell confidential phone records...
View ArticleMicrosoft Sentinel: A cloud-native SIEM with integrated GenAI
In a recent survey, 74% of cybersecurity professionals said that the threat landscape is the worst they’ve seen in 5 years.1 Escalating cyber threats, an expanding attack surface, and staffing...
View ArticleVolkswagen massive data leak caused by a failure to secure AWS credentials
A failure to properly protect access to its AWS environment is one of the root causes of the recent massive Volkswagen data leak, according to a presentation on the incident at the Chaos Computer Club...
View ArticleSecure by design vs by default – which software development concept is better?
As cybersecurity professionals, we need to know that the software products we acquire are safe and able to support or accommodate the procedures and tools we use to keep attackers at bay while...
View ArticleUS government sanctions Chinese cybersecurity company linked to APT group
The US Department of Treasury’s Office of Foreign Assets Control (OFAC) has issued sanctions against a Beijing cybersecurity company for its role in attacks attributed to a Chinese cyberespionage...
View ArticleCritical Windows LDAP flaw could lead to crashed servers, RCE attacks
Researchers have published a proof-of-concept exploit for a pair of Windows Lightweight Directory Access Protocol (LDAP) flaws that could lead to server crashes or remote code execution (RCE) on...
View ArticleDownload our security orchestration, automation, and remediation (SOAR) tools...
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SOAR can do for their organizations and how to choose the right solution.
View Article