Patching windows for organizations keep shortening, as threat actors exploit important vulnerabilities increasingly faster. According to recent report from VulnCheck, a third…
Browsing CategoryUncategorized
Palo Alto kauft CyberArk
Der israelische Identity-Management-Anbieter CyberArk wird Teil von Palo Alto Networks. ShU studio | shutterstock.com Mit der Übernahme des Identity-Management-Spezialisten CyberArk für rund…
Game changer: How AI simplifies implementation of Zero Trust security objectives
As enterprises increasingly move workloads to private cloud for reasons such as performance and compliance and to leverage AI on-premises, security leaders…
Palo Alto Networks to buy CyberArk for $25B as identity security takes center stage
Palo Alto Networks is making what could be its biggest bet yet by agreeing to buy Israeli identity security company CyberArk for…
Erneuter Hackerangriff bei Orange
width=”2470″ height=”1389″ sizes=”(max-width: 2470px) 100vw, 2470px”> Nachdem bereits im Februar die rumänische Niederlassung gehackt wurde, geriet Orange nun erneut unter Beschuss. Arsenie…
Dobrindt prüft Einsatz von US-Software Palantir
Kann sich den Einsatz von Palantir vorstellen: Bundesinnenminister Dobrindt hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) prüft den bundesweiten Einsatz der umstrittenen…
Ransomware upstart Gunra goes cross-platform with encryption upgrades
A new Linux variant of the “Gunra” ransomware family has been identified with highly configurable multithreading, allowing attackers to run up to…
Palo Alto Networks eyes $20B CyberArk deal as identity security takes center stage
Palo Alto Networks is closing in on what could be its biggest bet yet: a more than $20 billion acquisition of Israeli…
How CISOs can scale down without compromising security
Years ago, David Mahdi, now a CISO advisor at Transmit Security, found himself in a situation no security leader wants to face:…
Prepping for the quantum threat requires a phased approach to crypto agility
Enterprises need to act now to address the threats future quantum computing advances pose to current encryption standards. But the transition to…