Download the AI Risk Management Enterprise Spotlight
Download the March 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.
View ArticleDownload the UEM vendor comparison chart, 2025 edition
From the editors of our sister publication Computerworld, this vendor comparison chart helps IT and security staff understand what the major unified endpoint management (UEM) platforms can do for...
View ArticleUS Cybercom, CISA retreat in fight against Russian cyber threats: reports
Two reports published on Friday signaled the Trump administration may no longer consider Russia the US government’s top cyber foe, a development that would radically alter long-standing American...
View ArticleCISOs should address identity management ‘as fast as they can’ says...
CISOs should be moving “as fast as they can” to close holes in their identity and access management infrastructure to block cyber attacks, says a CrowdStrike executive. Adam Meyers, senior vice...
View ArticleSIEM-Kaufratgeber
Die kontextuellen Daten, die SIEM-Lösungen liefern, sind eine grundlegende Komponente moderner Security-Stacks.PeopleImages.com – Yuri A | shutterstock.com Protokoll-Daten zu auditieren, zu überprüfen...
View ArticleBubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2...
With the growing importance of security compliance for startups, more companies are seeking to achieve and maintain compliance with frameworks like SOC 2, ISO 27001 & GDPR. Bubba AI, Inc. is...
View ArticleManufacturers still poorly prepared for cyberattacks as IT/OT converge
As IT and operations technology (OT) converge, manufacturers find themselves increasingly under cyberattack — with many organizations unprepared for the challenge. According to a recent study by...
View Article7 key trends defining the cybersecurity market today
Enterprise security budgets are expected to increase 15% in 2025, from an estimated $184 billion in 2024 to $212 billion, according to Gartner. That’s good news for CISOs because it provides...
View ArticleMisconfigured access management systems expose global enterprises to security...
Global enterprises are facing a serious security crisis as misconfigured Access Management Systems (AMS) expose sensitive employee data and grant potential access to restricted facilities. The...
View ArticleHacker legen Schweizer Industriekonzern Adval Tech lahm
Der Schweizer Industriekonzern Adval Tech musste seine IT-Systeme wegen eines Cyberangriffs herunterfahren. Parilov – Shutterstock.com Nach eigenen Angaben wurden die IT-Systeme der Adval Tech Gruppe...
View ArticleVMware ESXi gets critical patches for in-the-wild virtual machine escape attack
Broadcom released emergency patches for its VMware ESXi, Workstation, and Fusion products to fix three vulnerabilities that can lead to virtual machine escape and are actively being exploited by...
View ArticlePolyglot files used to spread new backdoor
A threat actor is using polyglot files to conceal installation of a new backdoor as part of a spear-phishing campaign targeting firms in the United Arab Emirates (UAE), particularly in the aviation,...
View ArticleUser-Experience-Irrwege: 5 Fehler, die Ihre Sicherheit gefährden
Übermäßig komplexe, unnötige oder unsinnige Sicherheitsmaßnahmen können Mitarbeiter nachhaltig frustrieren. Das schafft neue Risiken. Foto: vchal | shutterstock.comJe mehr Zwang besteht, Systeme und...
View ArticleHunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC...
Pathfinder AI expands Hunters’ vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation and response. Hunters, the leader in next-generation SIEM, today announced Pathfinder AI,...
View ArticleMicrosoft pushes a lot of products on users, but here’s one cybersecurity can...
Microsoft sometimes gets a little annoying in its zeal to push things — it’s pushing Windows 11 24H2 to unmanaged customers and pushing Copilot to Edge and Windows and to consumers as well. But...
View ArticleChinese cyber espionage growing across all industry sectors
Security researchers are warning of a significant global rise in Chinese cyberespionage activity against organizations in every industry. Over the course of 2024, researchers from security firm...
View ArticleThe dirty dozen: 12 worst ransomware groups active today
Ransomware-as-a-service (RaaS) models, double extortion tactics, and increasing adoption of AI characterize the evolving ransomware threat landscape. Law enforcement takedowns of groups such as...
View ArticleCritical vulnerabilities expose network security risks in Keysight’s...
Keysight Technologies’ Ixia Vision product family has been found to contain critical security vulnerabilities that could allow remote attackers to compromise affected devices. According to a newly...
View ArticleSo werden PV-Anlagen digital angegriffen und geschützt
Unternehmen setzen vermehrt auf Solaranlagen mit Batteriespeichern, um hohe Energiekosten und Netzstabilitätsrisiken zu minimieren. Diese Systeme sind allerdings oft nicht gehärtet und damit ein immer...
View ArticlePolnische Raumfahrtbehörde kämpft mit Cyberattacke
Die polnische Raumfahrtbehörde POLSA wurde Ziel eines Cyberangriffs.BUTENKOV ALEKSEI – Shutterstock.com Wie die polnische Raumfahrtbehörde POLSA kürzlich über ihren X-Account mitteilte, ist es zu...
View Article