My Favorite B2B Email Marketing Examples and What Teams Can Learn

A Microsoft study found that people spend 15% of the workday checking email— that’s about six…

Do CISOs need to rethink service provider risk?

For Thiele, a request to view the enterprise risk register may be a ‘no’ but a…

70% of CISOs say internal conflicts more damaging than cyberattacks

Security experts advise CISOs to consider such perception problems when setting security strategies and communicating cybersecurity’s…

Support for Dobrindt’s plans for active cyber defense

Federal Interior Minister Alexander Dobrindt (CSU) wants to present a change to the law on cyber…

Step aside, SOC. It’s time to ROC

What is a ROC? At its core, the Resilience Risk Operations Center (ROC) is a proactive…

Cybersicherheit ist größte Herausforderung für die Finanzbranche

Laut Studie werden die Angriffe zunehmend komplexer und zielen auf Schwachstellen in Systemen und Prozessen. In…

Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution

A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It…

Hidden links: why your website traffic is declining

When analyzing the content of websites in an attempt to determine what category it belongs to,…

Malicious package with AdaptixC2 framework agent found in npm registry

Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative…

Board-ready cyber resilience: How to track and prove readiness

Every CISO out there knows the awkward silence that follows the question: “But how can we…