A sprawling surveillance campaign targeting Google Chrome and Microsoft Edge users is just the latest evolution of a seven-year-long project to distribute…
Browsing CategoryUncategorized
CSO 30 Awards 2025: Celebrating Excellence, Innovation and Leadership in Cybersecurity
With submissions showcasing advances in automation, inclusion, workforce development, and real-world resilience, this year’s programme highlights the multifaceted role of today’s CSO. As threats evolve and…
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race
While most cybersecurity companies pour resources into AI models, massive compute, hoovering up all the data, and enhanced analytics to detect and…
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise security: AI adoption is nearly universal, yet oversight…
Vaillant-CISO: “Starten statt Warten”
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?quality=50&strip=all 3543w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Key questions CISOs must ask before adopting AI-enabled cyber solutions
Adversaries are hijacking AI technology for their own purposes, generating deepfakes, creating clever phishing lures, and launching novel types of advanced attacks….
NETSCOUT wins “Overall Network Security Solution of the Year”
When it comes to cybersecurity, visibility is everything. Without it, even the most advanced tools can’t help teams detect, investigate, or respond…
What are zero-day attacks and why do they work?
Zero-day attacks have become a significant concern in the realm of cybersecurity, posing a formidable challenge to individuals and organizations alike. These…
The first line of defense is still the network. But that’s only the beginning
For years, the security industry has been captivated by the promises of new acronyms: EDR, XDR, CDR. Each wave has promised broader…
Microsoft gives Windows admins a legacy migration headache with WINS sunset
Microsoft has given system administrators until 2034 to stop using WINS (Windows Internet Name Service) NetBIOS name resolution technology in their networks…