Was CISOs von Moschusochsen lernen können

Das ist die Essenz dessen, was ich als “Moschusochsenstrategie” bezeichne. Der Hintergrund: Werden Moschusochsen von Wölfen…

The CSO guide to top security conferences

Blue Team Con 2024, Chicago, Illinois: 4-7 September Gartner IT Symposium/Xpo, Queensland, Australia: 8-11 September 16th…

Diese Unternehmen hat es schon erwischt

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind. Roman Samborskyi | shutterstock.com Sie…

6 key trends redefining the XDR market

The extended detection and response (XDR) market is experiencing significant growth, driven by escalating cybersecurity threats…

The rise of the compliance super soldier: A new human-AI paradigm in GRC

As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at…

Some Brother printers have a remote code execution vulnerability, and they can’t fix it

Two others, CVE-2024-51980 and CVE-2024-51981, enable server-side request forgery (SSRF), allowing printers to send crafted requests…

From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains

Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies…

CISA Issues Threat Warning After ‘Potential’ Oracle Cloud Breach

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning about the potential for increased security…

Krebs Leaves SentinelOne Amid Trump Administration Fight

Chris Krebs, the man at the center of President Donald Trump’s revoking of security clearances held…

ImageRunner Flaw Exposed Sensitive Information in Google Cloud

Google Cloud recently patched a privilege escalation vulnerability that could have allowed threat actors to gain…