So rechtfertigen Sie Ihre Security-Investitionen
Technologie mit strategischen Prioritäten verknüpfen Um in der Vorstandsetage glaubwürdig zu sein, müssen CISOs ihre geplanten Ausgaben anhand der Unternehmenszielsetzung
Continue readingTechnologie mit strategischen Prioritäten verknüpfen Um in der Vorstandsetage glaubwürdig zu sein, müssen CISOs ihre geplanten Ausgaben anhand der Unternehmenszielsetzung
Continue readingGenerative AI has emerged as one of the most powerful technologies of our era. Capable of producing realistic text, images,
Continue readingI’m pleased to share three significant updates that advance cybersecurity for organizations that rely on Microsoft technologies. These milestones expand
Continue readingWelcome back to another This Week in Scams. This week, have attacks that take over Androids and iPhones, plus news that
Continue readingFor the first time in history, cyber malicious actors have used Anthropic’s Claude Code, a generative AI coding assistant, to
Continue readingThe Justice Department notched a few more wins in the fight against North Korean cryptocurrency heists and the regime’s expansive
Continue readingIn March 2025, Kaspersky detected a wave of infections that occurred when users clicked on personalized phishing links sent via
Continue readingA Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of
Continue readingGoogle has filed a lawsuit to dismantle “Lighthouse”, a phishing-as-a-service (PhaaS) platform used by cybercriminals worldwide to steal credit card
Continue readingThe U.S. government is reportedly preparing to ban the sale of wireless routers and other networking gear from TP-Link Systems,
Continue reading