srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?quality=50&strip=all 3840w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2546315779_16.jpg?resize=444%2C250&quality=50&strip=all 444w”…
News
Enterprise Spotlight: Setting the 2026 IT agenda
IT leaders are setting their operations strategies for 2026 with an eye toward agility, flexibility, and tangible business results. Download the January…
Critical vulnerability in IBM API Connect could allow authentication bypass
IBM is urging customers to quickly patch a critical vulnerability in its API Connect platform that could allow remote attackers to bypass…
Equifax Europe CISO: Notorious breach spurred cybersecurity transformation
The 2017 Equifax breach was one of biggest security incidents of the 21st century. A textbook data leak case, the breach impacted more than 147…
Daran scheitert Passwordless
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?quality=50&strip=all 8256w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Cybercrime Inc.: Wenn Hacker besser organsiert sind als die IT
Cybercrime hat sich zur organisierten Industrie mit Arbeitsteilung gewandelt. DC Studio – Shutterstock.com Was einst in Foren mit selbstgeschriebenen Schadcodes begann, hat…
So geht Post-Incident Review
Post-Incident Reviews können dazu beitragen, die richtigen Lehren aus Sicherheitsvorfällen zu ziehen – wenn sie richtig aufgesetzt sind. dotshock | shutterstock.com Angenommen,…
6 cyber insurance gotchas security leaders must avoid
Facing ever-mounting cyberthreats, enterprises are increasingly turning to cyber insurance to address the potentially severe financial damage a successful attack can inflict….
Patch Tuesday 2025 roundup: The biggest Microsoft vulnerabilities of the year
Every day has the potential to be a bad day for a CSO. However, the second Tuesday of each month – Patch…
Sieben Anzeichen dafür, dass Ihr Cybersecurity-Framework überarbeitet werden muss
Cybersecurity ist kein Nice-to-have, sondern ein Muss. Dennoch vernachlässigen immer noch zu viele Unternehmen seine Pflege. Summit Art Creations – shutterstock.com Cybersicherheits-Frameworks…