Microsoft is warning admins of an Office security bypass zero day vulnerability that can be triggered simply by a user opening a…
News
4 Probleme, die CISOs behindern
Lesen Sie, welche strategischen Probleme CISOs bei ihren Aufgaben behindern. alphaspirit.it – shutterstock.com Viele Sicherheitsverantwortliche glauben, dass ein Cybervorfall unvermeidlich ist –…
CISA releases technology readiness list for post-quantum cryptography
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory mapping post-quantum cryptography (PQC) standards to common enterprise hardware…
Overcoming AI fatigue
AI is now everywhere within enterprises. Many CISOs I speak with feel stuck between wanting to move forward and not knowing where…
AI overload to accelerate zero-trust data governance adoption
Gartner has warned that the increasing volume of data generated by AI threatens the future reliability of large language models (LLMs). So…
4 issues holding back CISOs’ security agendas
Many security leaders believe a cyberbreach is inevitable, with the timing being the only uncertainty. It’s a belief encapsulated in the common…
CNAPP-Kaufratgeber
Gorodenkoff | shutterstock.com Cloud Security bleibt ein diffiziles Thema und die Tools, mit denen sie sich gewährleisten lässt, werden zunehmend komplexer und…
Unplugged holes in the npm and yarn package managers could let attackers bypass defenses against Shai-Hulud
Javascript developers should consider moving away from the npm and yarn platforms for distributing their work because newly-found holes allow threat actors…
Russian hackers accused of attack on Poland electricity grid
On Dec. 29 and 30, the Polish electricity grid was subjected to a cyberattack that nearly knocked out power to hundreds of…
Digitale Integrität: Warum Firewall und IDS nicht reichen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2727061735.jpg?quality=50&strip=all 800w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2727061735.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2727061735.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2727061735.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2727061735.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2727061735.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”800″ height=”450″ sizes=”auto, (max-width: 800px) 100vw, 800px”>Die systematische Erfassung von…