“Sovereignty isn’t just a region on a map — it’s an operating model. The hard part…
Category: Insights
Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts
He added, Agenda Ransomware exploits Windows-centric assumptions, under-protected RMM tools, and neglected driver monitoring. Most organizations…
Europol disrupts network behind 49 million fake accounts
On October 10, Europol, in cooperation with police authorities in Estonia, Finland, Latvia and Austria, raided…
Risks of recovering from ransomware attacks
“The 60 percent recovery rate reflects several technical and operational realities that regularly arise when responding…
Do CISOs need to rethink service provider risk?
For Thiele, a request to view the enterprise risk register may be a ‘no’ but a…
70% of CISOs say internal conflicts more damaging than cyberattacks
Security experts advise CISOs to consider such perception problems when setting security strategies and communicating cybersecurity’s…
Support for Dobrindt’s plans for active cyber defense
Federal Interior Minister Alexander Dobrindt (CSU) wants to present a change to the law on cyber…
Step aside, SOC. It’s time to ROC
What is a ROC? At its core, the Resilience Risk Operations Center (ROC) is a proactive…
Cybersicherheit ist größte Herausforderung für die Finanzbranche
Laut Studie werden die Angriffe zunehmend komplexer und zielen auf Schwachstellen in Systemen und Prozessen. In…
Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity
Identify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets) Stage scripts or…