As data sovereignty laws fracture the global internet, CSOs are scrutinizing ambitious new compliance blueprints, with their success or failure set to…
Date Archives October 2025
The 10 biggest issues CISOs and cyber teams face today
The CISO job is tough, and it’s getting tougher: 66% of security leaders surveyed for the 2025 State of Cybersecurity report from…
Die besten IAM-Tools
Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter und -Tools. Foto: ne2pi – shutterstock.com…
Scammers try to trick LastPass users into giving up credentials by telling them they’re dead
Are you sure you’re still alive? If so, you may fall for a phishing scam aimed at getting the master login passwords…
Critical Microsoft WSUS flaw exploited in wild after insufficient patch
Microsoft released out-of-band patches on Thursday to “comprehensively” fix a critical vulnerability in the Windows Server Update Service (WSUS) after the first…
UN agreement on cybercrime criticized over risks to cybersecurity researchers
Cybersecurity researchers could face criminal charges for performing their legitimate work if the United Nations Convention against Cybercrime is ratified in a…
Identity Management and Information Security News for the Week of October 24th: Veeam, Saviynt, Rubrik, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Lazarus group targets European drone makers in new espionage campaign
Cybersecurity researchers from ESET have identified a new Lazarus Group campaign targeting European defense contractors, particularly those involved in unmanned aerial vehicle…
Der Weg zur CPS-Resilienz
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?quality=50&strip=all 3636w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2608026877.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Quantum resistance and the Signal Protocol: From PQXDH to Triple Ratchet
The advent of quantum computing poses a significant threat to modern digital communication security, which relies on cryptographic protocols that are vulnerable…