CISO turnover is showing signs of stability, dropping from 21% in 2022 to 12% in 2023 and to an annualized 11% in…
Browsing CategoryUncategorized
7 Anzeichen für akuten MSSP-Bedarf
Managed Security Service Provider können das Sicherheitsniveau nachhaltig steigern. Godlikeart | shutterstock.com Ein Managed Security Service Provider (MSSP) bietet seinen Kunden ein…
Attackers exploiting NetScaler ADC and Gateway zero day flaw, Citrix warns
Citrix NetScaler ADC and NetScaler Gateway customers have been hit by a new round of zero day vulnerabilities that require urgent patching,…
Anthropic detects the inevitable: genAI-only attacks, no humans involved
When Anthropic published a report Wednesday detailing genAI attacks that entirely bypassed humans, as opposed to human attackers using AI tools as…
Whistleblower: DOGE put Social Security database covering 300 million Americans on insecure cloud
The Elon Musk–founded Department of Government Efficiency (DOGE) uploaded to an insecure Amazon Web Services server a copy of Americans’ Social Security…
Storm-0501 debuts a brutal hybrid ransomware attack chain
Microsoft Threat Intelligence today released a report on the financially motivated group Storm-0501, warning that the threat actor has sharpened its ransomware…
Fachkräftemangel bedroht Cybersicherheit
Um die Cybersicherheit in Unternehmen zu stärken, fehlt es derzeit nach wie vor an Fachkräften. Dmitry Kovalchuk – shutterstock.com Ein aktueller Bericht…
Only 49% of companies to increase cyber budget after a breach
The long held conventional wisdom that organizations commit to increased cybersecurity investments only after a breach has taken a hit. IBM’s latest…
5 ways to improve cybersecurity function while spending less
As a veteran CISO for state and local agencies, Orange County CISO Andrew Alipanah knows how to optimize security functions within impossibly…
Kubernetes Security: Wie Sie Ihre Cluster (besser) absichern
Anatoliy Eremin | shutterstock.com Kubernetes hat sich unter Enterprise-Softwareentwicklern zu einem durchschlagenden Erfolg entwickelt. Das veranlasst kriminelle Hacker zunehmend dazu, entsprechende Installationen…