Auf der RSA Conference wurden zentrale Strategien diskutiert, wie Unternehmen KI sicher und wirkungsvoll einsetzen können. Gorodenkoff – Shutterstock.com Künstliche Intelligenz (KI) wird künftig eine […]
Cut CISA and Everyone Pays for It
Gutting CISA won’t just lose us a partner. It will lose us momentum. And in this game, that’s when things break. ​The original article found […]
Keeper Security renews Atlassian Williams Racing F1 partnership
Keeper Security, the provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, today announced a […]
TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China
Ireland’s Data Protection Commission (DPC) on Tuesday fined popular video-sharing platform TikTok €530 million ($601 million) for infringing data protection regulations in the region by […]
Microsoft ernennt Deputy-CISO für Europa
Microsoft ernennt einen Deputy-CISO für Europa. MacroEcon – shutterstock.com Die immer lauter werdenden Rufe nach einer digitalen Souveränität Europas angesichts des erratisch agierenden Mannes im […]
Mehr Assets – mehr Angriffsfläche – mehr Risiko
loading=”lazy” width=”400px”>Unternehmen sollten ihre Angriffsflächen genau kennen. ozalpvahid – shutterstock.com Nur wer seine Angriffsflächen kennt, kann diese wirksam verteidigen. Was eine Binsenweisheit scheint, scheint vielen […]
How to Automate CVE and Vulnerability Advisory Response with Tines
Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community […]
MIWIC25: Marine Ruhamanya, Cybersecurity Senior Manager
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in […]
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks
The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. “MintsLoader operates through a multi-stage infection chain […]
What is EDR? An analytical approach to endpoint security
Endpoint detection and response (EDR) security tools monitor end-user hardware devices across a network for a range of suspicious activities and behavior, reacting automatically to […]