A Microsoft study found that people spend 15% of the workday checking email— that’s about six…
Do CISOs need to rethink service provider risk?
For Thiele, a request to view the enterprise risk register may be a ‘no’ but a…
70% of CISOs say internal conflicts more damaging than cyberattacks
Security experts advise CISOs to consider such perception problems when setting security strategies and communicating cybersecurity’s…
Support for Dobrindt’s plans for active cyber defense
Federal Interior Minister Alexander Dobrindt (CSU) wants to present a change to the law on cyber…
Step aside, SOC. It’s time to ROC
What is a ROC? At its core, the Resilience Risk Operations Center (ROC) is a proactive…
Cybersicherheit ist größte Herausforderung für die Finanzbranche
Laut Studie werden die Angriffe zunehmend komplexer und zielen auf Schwachstellen in Systemen und Prozessen. In…
Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution
A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It…
Hidden links: why your website traffic is declining
When analyzing the content of websites in an attempt to determine what category it belongs to,…
Malicious package with AdaptixC2 framework agent found in npm registry
Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative…
Board-ready cyber resilience: How to track and prove readiness
Every CISO out there knows the awkward silence that follows the question: “But how can we…