Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security

“In 2025 alone, Akira ransomware accounted for about 8–11% of all successful ransomware attacks globally, with…

Gipfel in Berlin – Europa strebt digitale Souveränität an

Sven Kummer, Gründer eines Software-Unternehmens für sicheren Newsletter-Versand aus Freiburg, sagt, es sei gut, dass versucht…

The rise of the chief trust officer: Where does the CISO fit?

CISO and CTrO: A model for a working partnership? As customers, partners and regulators demand greater…

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

Microsoft is killing off an obsolete and vulnerable encryption cipher that Windows has supported by default…

ISO and ISMS: 9 reasons security certifications go wrong

2. Approaching implementation as a one-off activity One of the most common reasons why ISO/ISMS implementations…

Empathie trifft IT-Sicherheit: Der Weg zu gelebter Compliance

CISOs sollten Sicherheitsrichtlinien mit Blick auf die Belegschaft gestalten. earthphotostock – shutterstock.com In vielen Unternehmen stoßen…

Was ist Social Engineering?

Social Engineering hat sich für Cyberkriminelle als besonders erfolgreich erwiesen, wenn es darum geht in Unternehmen…

Spam flooding npm registry with token stealers still isn’t under control

Sonatype’s Fox said IT leaders need to buy tools that can intercept and block malicious downloads…

From detection to response: Why confidence is the real game changer

Cybersecurity often feels like a race where you don’t know when the starting gun will fire.…

Why SOC efficiency is the most valuable currency in cybersecurity

In cybersecurity, time is scarce, talent is scarce, and certainty is scarce. That’s why efficiency has…