Data sovereignty proof: How to verify controls like ‘Project Texas’

“Sovereignty isn’t just a region on a map — it’s an operating model. The hard part…

Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts

He added, Agenda Ransomware exploits Windows-centric assumptions, under-protected RMM tools, and neglected driver monitoring. Most organizations…

Europol disrupts network behind 49 million fake accounts

On October 10, Europol, in cooperation with police authorities in Estonia, Finland, Latvia and Austria, raided…

Risks of recovering from ransomware attacks

“The 60 percent recovery rate reflects several technical and operational realities that regularly arise when responding…

Do CISOs need to rethink service provider risk?

For Thiele, a request to view the enterprise risk register may be a ‘no’ but a…

70% of CISOs say internal conflicts more damaging than cyberattacks

Security experts advise CISOs to consider such perception problems when setting security strategies and communicating cybersecurity’s…

Support for Dobrindt’s plans for active cyber defense

Federal Interior Minister Alexander Dobrindt (CSU) wants to present a change to the law on cyber…

Step aside, SOC. It’s time to ROC

What is a ROC? At its core, the Resilience Risk Operations Center (ROC) is a proactive…

Cybersicherheit ist größte Herausforderung für die Finanzbranche

Laut Studie werden die Angriffe zunehmend komplexer und zielen auf Schwachstellen in Systemen und Prozessen. In…

Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity

Identify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets) Stage scripts or…