2. Approaching implementation as a one-off activity One of the most common reasons why ISO/ISMS implementations…
Category: News
Empathie trifft IT-Sicherheit: Der Weg zu gelebter Compliance
CISOs sollten Sicherheitsrichtlinien mit Blick auf die Belegschaft gestalten. earthphotostock – shutterstock.com In vielen Unternehmen stoßen…
Was ist Social Engineering?
Social Engineering hat sich für Cyberkriminelle als besonders erfolgreich erwiesen, wenn es darum geht in Unternehmen…
Spam flooding npm registry with token stealers still isn’t under control
Sonatype’s Fox said IT leaders need to buy tools that can intercept and block malicious downloads…
From detection to response: Why confidence is the real game changer
Cybersecurity often feels like a race where you don’t know when the starting gun will fire.…
Why SOC efficiency is the most valuable currency in cybersecurity
In cybersecurity, time is scarce, talent is scarce, and certainty is scarce. That’s why efficiency has…
Why network visibility is the thread that holds cybersecurity together
Every organization is chasing the same thing in security: speed, clarity, and confidence. But in reality,…
How shadow IT leaves every industry in the dark
Shadow IT is everywhere. What began with employees or departments bringing familiar tools such as personal…
Anthropic’s AI used in automated attacks
Anthropic reported that a group of what it believes to be Chinese hackers carried out a…
Bundestag beschließt NIS2-Umsetzung
Kritik von Experten Der Bitkom hält von der kurzfristig in das Gesetzgebungsverfahren eingebrachten Neuregelung zu „kritischen…