CISOs are coming under increased pressures to keep quiet about security incidents because concerns about corporate reputation often outweigh adherence to regulatory…
Date Archives September 2025
Malicious npm packages use Ethereum blockchain for malware delivery
Attackers behind a recent supply chain attack that involved rogue GitHub repositories and npm packages used smart contracts on the Ethereum blockchain…
Relief for European Commission as court upholds EU Data Privacy Framework agreement with US
The controversial Data Privacy Framework (DPF) agreement between the EU and the US has been upheld after the European Court of Justice…
Buyer’s guide: Data protection for hybrid clouds
Data protection is a broad category that includes data security but also encompasses backup and disaster recovery, safe data storage, business continuity and…
Zero-Trust bereitet CISOs Probleme
Laut einer Umfrage ist die Umsetzung von Zero Trust für die meisten CISOs nicht leicht. Gannvector – shutterstock.com Laut einem aktuellen Bericht…
How the generative AI boom opens up new privacy and cybersecurity risks
It was one of the viral tech news stories at the start of July when WeTransfer, the popular file sharing service used…
Jaguar Land Rover nach Cyberattacke lahmgelegt
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?quality=50&strip=all 6909w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Richard-OD_shutterstock_2589622701_GermanyOnly_NURREDAKTIONELL-1.jpg?resize=444%2C250&quality=50&strip=all 444w”…
A CISO’s guide to monitoring the dark web
Most security leaders know the dark web exists, but many still view it as the internet’s seedy underbelly — useful for criminals…
Für Cyberattacken gewappnet – Krisenkommunikation nach Plan
loading=”lazy” width=”400px”>Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind. Gorodenkoff – shutterstock.com Cyberangriffe fordern nicht nur CISOs in punkto Prävention und…
Warning: Flaws in Copeland OT controllers can be leveraged by threat actors
Experts have warned IT leaders for years that operational technology (OT) devices connected to the internet can have serious vulnerabilities that lead…