669226129 Gorodenkoff | shutterstock.com Trotz Millioneninvestitionen in Security Operations Center (SOCs) und modernsten Detection-Technologien sind Breaches weiterhin an der Tagesordnung – Tendenz…
Date Archives August 2025
Munich Reinsurance unites global security teams to boost resilience, cut costs
When an insurer takes on big risks—whether it’s covering homes, cars, or health care—it often turns to reinsurers like Munich Re Group…
2025 CSO Hall of Fame: Meg Anderson on AI, strategic security investments, and life after InfoSec
Meg Anderson has spent nearly two decades leading enterprise cybersecurity, most recently as vice president and chief information security officer at Principal…
Need help with AI safety? Stay ahead of risks with these tools and frameworks
The Cloud Security Alliance (CSA) has spent the past 14 years bringing together experts to help make complex technologies like cloud computing…
Meet the unsung silent hero of cyber resilience you’ve been ignoring
At 02:17 a.m., the Security Information and Event Management (SIEM) dashboard blinked. A remote user had just authenticated into a crown-jewel system…
BSI-E-Mail-Checker soll vor Hackern schützen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?quality=50&strip=all 4539w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Rowhammer attack can backdoor AI models with one devastating bit flip
A team of researchers from George Mason University has developed a new method of using the well-known Rowhammer attack against physical computer…
BSI-Doppelstrategie für digitale Souveränität
width=”4743″ height=”2667″ sizes=”auto, (max-width: 4743px) 100vw, 4743px”>BSI-Präsidentin Claudia Plattner: “Je mehr vertrauenswürdige Produkte verfügbar sind, desto souveräner können wir entscheiden – und…
How AI is reshaping cybersecurity operations
Generative AI has become a pervasive tool in the enterprise. According to a recent Boston Consulting Group survey, 50% of organizations are…
83% of CISOs say staff shortage is major issue for defense
Most enterprise CISOs can’t remember a time when there wasn’ta cybersecurity talent shortage, but a new report from Accenture underscores the extent…