Mit MXDR gegen den Fachkräftemangel
Mit dem Einsatz von MXDR können Unternehmen ihr IT-Security-Team durch Experten erweitern und deren Expertise nutzen.G Data IT-Sicherheit ist für Unternehmen von entscheidender Bedeutung, um die...
View ArticleAustralia bans the use of Kaspersky products by government entities
The Secretary of the Department of Home Affairs issued on Friday a mandatory direction under the Protective Security Policy Framework (PSPF) to government entities requiring all to prevent the...
View ArticleStrategic? Functional? Tactical? Which type of CISO are you?
When executives at a startup asked security leader George Gerchow to advise them on selecting a CISO, Gerchow recommended finding a security chief who had the skills to scale a security program,...
View ArticleAI can kill banks: Cybersecurity’s disinformation gap
The British research organization Say No To Disinfo has simulated an AI-driven disinformation campaign in cooperation with communications specialists Fenimore Harper. As part of the campaign, 500 bank...
View ArticleBybit’s $1.5B hack linked to North Korea’s Lazarus group
An independent investigation into the $1.5 billion hack suffered by the Bybit cryptocurrency exchange on Friday has revealed connections to the infamous Lazarus group. A day after the attack was...
View ArticleCIO Cloud Summit: Best Practices von Anwendern für Anwender
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?quality=50&strip=all 1682w,...
View ArticleDeutscher IT-Dienstleister im Visier von Ransomware-Angreifern
Die Hackerbande Akira soll Daten von InSyst gestohlen haben.Quality Pixel – Shutterstock.com Der IT-Dienstleister InSyst wurde offenbar Ziel einer Ransomware-Attacke. Die Ransomware-Gruppe Akira fügte...
View ArticleSecurity Awareness Trainings: Schulungen richtig managen
Lesen Sie, welche Aspekte besonders entscheidend sind, damit Ihr Security Awareness Training erfolgreich ist. Foto: nialowwa – shutterstock.comStudien wie die von Verizon oder IBM zeigen immer wieder...
View ArticleDOGE’s US worker purge has created a spike in insider risk
We talk a good deal about insider risk, how it evolves from threats within an organization, and how to get ahead of its escalation by being proactive and dealing with situations as they arise, well...
View ArticleCIO des Jahres 2025 – Wettbewerb startet
Siegerinnen und Sieger des vergangenen Jahres jubeln über ihre CIO des Jahres Awards. Machen Sie mit und bewerben Sie sich – dann stehen Sie vielleicht im Oktober 2025 auf der großen Gala-Bühne und...
View ArticleKrypto-Rekordraubzug von Nordkorea gesteuert?
Beim Angriff auf die Kryptobörse Bybit wurden Ethereum-Token im Wert von (derzeit) rund 1,5 Milliarden Dollar gestohlen.Bits And Splits | shutterstock.com Die (gemessen am Handelsvolumen) weltweit...
View ArticleHow to create an effective incident response plan
When a company experiences a major IT systems outage — such as from a cybersecurity incident — it’s essentially out of business for however long the downtime lasts. That’s why having an effective...
View ArticleStürmer Maschinen von Ransomware-Attacke getroffen
Die Ransomware-Bande Lynx erpresst den Großhändler Stürmer Maschinen mit gestohlenen Daten.DC Studio – Shutterstock.com Die Ransomware-Bande Lynx hat den Maschinengroßhändler Stürmer Maschinen...
View ArticleCritical deserialization bugs in Adobe, Oracle software actively exploited,...
CISA is warning Adobe and Oracle customers about in-the-wild exploitation of critical vulnerabilities affecting the services of these leading enterprise software providers. The US cybersecurity...
View ArticleGeopolitical tensions fuel surge in OT and ICS cyberattacks
Attacks against operational technology (OT) networks are on the rise, fueled by geopolitical tensions and conflicts, as OT security fast becomes a mainstream concern. Two new threat groups emerged in...
View ArticleWhat CISOs need from the board: Mutual respect on expectations
There has been an extremely strong focus of late on organizational boards’ concerns about cyber threats. This focus has come alongside amplified regulatory attention, much of which pushes for stronger...
View Article4 key trends reshaping the SIEM market
Security information and event management (SIEM) platforms have evolved far beyond their basic log collection and correlation roots. With cyber threats moving too fast for manual intervention, leading...
View ArticleFortifying cyber security: What does secure look like in 2025?
The evolving cybersecurity landscape has increased security pressures for IT leaders. With the World Economic Forum estimating, the global cost of cybercrime is projected to reach $10.5trillion...
View ArticleWhy cyber hygiene remains critical in the era of AI-driven threats
Cyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of valuable data, safeguarding operations has never been more important. Now, half (50%) of...
View ArticleCyberangriffe: Fertigungsbranche noch immer schlecht vorbereitet
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?quality=50&strip=all 5568w,...
View Article