Tools, die die KI-Infrastruktur unter die Lupe nehmen, optimieren und absichern, liegen im Trend. Unser Ratgeber führt Sie zur richtigen AI-Security-Posture-Management-Lösung. Julien…
Date Archives December 2025
Newly discovered malicious extensions could be lurking in enterprise browsers
A sprawling surveillance campaign targeting Google Chrome and Microsoft Edge users is just the latest evolution of a seven-year-long project to distribute…
CSO 30 Awards 2025: Celebrating Excellence, Innovation and Leadership in Cybersecurity
With submissions showcasing advances in automation, inclusion, workforce development, and real-world resilience, this year’s programme highlights the multifaceted role of today’s CSO. As threats evolve and…
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race
While most cybersecurity companies pour resources into AI models, massive compute, hoovering up all the data, and enhanced analytics to detect and…
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise security: AI adoption is nearly universal, yet oversight…
Vaillant-CISO: “Starten statt Warten”
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?quality=50&strip=all 3543w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/12/R61_6423__MKP.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Key questions CISOs must ask before adopting AI-enabled cyber solutions
Adversaries are hijacking AI technology for their own purposes, generating deepfakes, creating clever phishing lures, and launching novel types of advanced attacks….
NETSCOUT wins “Overall Network Security Solution of the Year”
When it comes to cybersecurity, visibility is everything. Without it, even the most advanced tools can’t help teams detect, investigate, or respond…
What are zero-day attacks and why do they work?
Zero-day attacks have become a significant concern in the realm of cybersecurity, posing a formidable challenge to individuals and organizations alike. These…
The first line of defense is still the network. But that’s only the beginning
For years, the security industry has been captivated by the promises of new acronyms: EDR, XDR, CDR. Each wave has promised broader…