Despite all the warnings, and constant news of devastating cyberattacks, enterprise users are still cutting corners when it comes to identity and…
Browsing CategoryUncategorized
Cisco identifies vulnerability in ISE network access control devices
The latest flaw in Cisco Systems Identity Services Engine (ISE), which could expose sensitive information to an attacker, requires rotation of credentials…
The 2 faces of AI: How emerging models empower and endanger cybersecurity
In my long career of safeguarding digital assets, I’ve seen technology shifts come and go, but nothing compares to the disruptive force…
What to Expect from the Solutions Spotlight with ThreatLocker on January 13th, 2026
Solutions Review’s Solution Spotlight with ThreatLocker is part of an exclusive webinar series for enterprise business software users. This event will outline…
Cybersecurity at the edge: Securing rugged IoT in mission-critical environments
Edge computing is no longer a futuristic concept; it’s a reality shaping mission-critical operations across defense, utilities and public safety. Rugged IoT…
Phishing-Angreifer setzen vermehrt auf E-Mail-Routing-Lücken
Angreifer missbrauchen falsch konfigurierte Richtlinien, um Phishing-E-Mails wie interne E-Mails aussehen zu lassen, Filter zu umgehen und Anmeldedaten zu stehlen. batjaket –…
NIS2-Umsetzung: Neues BSI-Portal geht an den Start
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?quality=50&strip=all 7500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Critical jsPDF vulnerability enables arbitrary file read in Node.js deployments
A now-fixed critical flaw in the jsPDF library could enable attackers to extract sensitive files from enterprise servers and embed them directly…
Top cyber threats to your AI systems and infrastructure
Attacks against AI systems and infrastructure are beginning to take shape in real-world instances, and security experts expect the number of these…
Die wichtigsten CISO-Trends für 2026
Lesen Sie, vor welchen Herausforderungen CISOs mit Blick auf das Jahr 2026 stehen. SuPatMaN – shutterstock.com Das Jahr 2025 war für viele…