srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?quality=50&strip=all 7008w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Date Archives October 2025
Intel- und AMD-Chips physisch angreifbar
Chips von Intel und AMD sind laut Forschern anfällig für physische Cyberattacken. IM Imagery – shutterstock.com Mit „Battering RAM“ und „Wiretrap“ haben…
Disaster recovery and business continuity: How to create an effective plan
The core principles of disaster recovery (DR) and business continuity have remained relatively unchanged for decades: identify risks, conduct a business impact…
10 Kennzahlen, die CISOs weiterbringen
Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.com Die Security-Performance zu messen, gehört vielleicht…
That innocent PDF is now a Trojan Horse for Gmail attacks
Enterprise users know by now that they shouldn’t click on suspicious-looking links or download strange files. But what about innocuous, ever-present PDFs?…
Chinese APT group Phantom Taurus targets gov and telecom organizations
Researchers have documented a previously unknown threat actor that aligns with China’s intelligence collection interests. The group primarily targets government and telecommunications…
Microsoft plots new path for Sentinel, adding agentic AI features
Microsoft has announced a raft of new AI features for Sentinel SIEM and Security Copilot as part of its push to turn…
Cyber-Bedrohungslage in der EU verschärft sich
Ransomware liegt weiter im Trend bei Cyberkriminellen. Studio-M – shutterstock.com Die Bedrohungslage für Europas digitale Infrastruktur hat sich weiter verschärft. Das geht…
Spotlight report: Securing the cloud
Download the October 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. aria-label=”Embed of…
CISOs advised to rethink vulnerability management as exploits sharply rise
Enterprise attack surfaces continue to expand rapidly, with more than 20,000 new vulnerabilities disclosed in the first half of 2025, straining already…