Data protection is a broad category that includes data security but also encompasses backup and disaster recovery, safe data storage, business continuity and…
Browsing CategoryUncategorized
Zero-Trust bereitet CISOs Probleme
Laut einer Umfrage ist die Umsetzung von Zero Trust für die meisten CISOs nicht leicht. Gannvector – shutterstock.com Laut einem aktuellen Bericht…
How the generative AI boom opens up new privacy and cybersecurity risks
It was one of the viral tech news stories at the start of July when WeTransfer, the popular file sharing service used…
Jaguar Land Rover nach Cyberattacke lahmgelegt
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?quality=50&strip=all 6909w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=444%2C250&quality=50&strip=all 444w”…
A CISO’s guide to monitoring the dark web
Most security leaders know the dark web exists, but many still view it as the internet’s seedy underbelly — useful for criminals…
Für Cyberattacken gewappnet – Krisenkommunikation nach Plan
loading=”lazy” width=”400px”>Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind. Gorodenkoff – shutterstock.com Cyberangriffe fordern nicht nur CISOs in punkto Prävention und…
Warning: Flaws in Copeland OT controllers can be leveraged by threat actors
Experts have warned IT leaders for years that operational technology (OT) devices connected to the internet can have serious vulnerabilities that lead…
Palo Alto Networks, Zscaler, Cloudflare hit by the latest data breach
When three prominent vendors, Palo Alto Networks, ZScaler, and Cloudflare, announced on Tuesday that they were hit by a cyber attack targeting…
CISSP certification: Requirements, training, exam, and cost
What is CISSP? Certified Information Systems Security Professional (CISSP) is an advanced certification for IT and cybersecurity professionals that demonstrates their ability…
CCSP certification: Exam, cost, requirements, training, salary
CCSP certification Certified Cloud Security Professional (CCSP) is a cloud-focused security certification for experienced security pros responsible for applying best practices to…