The importance of passwords is often overlooked—until a data breach occurs. In other words, nothing highlights the necessity of a strong password more than the consequences of a weak one. However, most end users are unaware of how vuln ...

The importance of passwords is often overlooked—until a data breach occurs. In other words, nothing highlights the necessity of a strong password more than the consequences of a weak one. However, most end users are unaware of how vuln ...
Credit card thieves cost businesses billions each year. In response, major credit card companies created the Payment Card Industry Data Security Standard (PCI-DSS) to address this threat, requiring specific security measures for any or ...
DeepSeek is fueling the AI debate. While proponents emphasize performance and cost advantages, opponents warn of opaque data protection rules.
APT groups are distributing AI models with hidden backdoors, warns Waldemar Bergstreiser of Kaspersky in an interview.
Cybersecurity is a complex interplay of prevention, detection, response, and reflection, says guest author Alexander Bogocz of Skaylink.
Between mid-2023 and mid-2024, an average of 309,000 new malware variants were identified daily.
Artificial Intelligence (AI) is increasingly being utilised in cybersecurity, particularly for identifying deviations in network traffic. But does the application of AI truly make sense? Dr Sebastian Schmerl from Arctic Wolf delves int ...
Automation is making pentesting affordable even for smaller companies, says Mareen Dose from indevis.
A study by Huawei and Roland Berger highlights key trends and emerging requirements for data storage solutions in the age of AI.
A recent study by Software AG reveals that 54% of German knowledge workers are using unsanctioned AI tools, a practice known as "shadow AI." Nearly as many workers would bypass any bans imposed on these tools.
APIs have become an attractive target for cybercriminals, as many companies lack effective monitoring of malicious activities or third-party API integrations.
'In the future, customers' trust in car brands will be measured by how they handle cybersecurity and prevent external attacks,' says Professor Stefan Bratzel from CAM.
The introduction of AI in companies is often still hesitant, and this reluctance inadvertently opens the door to a new type of shadow IT.
Attackers are increasingly using sophisticated techniques to disguise their attacks and deploy adaptive attack patterns, warns Elena Simon from Gcore.
HP’s latest Threat Insights Report reveals how cybercriminals are leveraging generative AI to craft malicious code.
Techwear and smart fashion combine fashion with advanced technology and connectivity - including AI.
Telekom opens its Master Security Operations Center in Bonn, analyzing billions of security-relevant data points per day.
eco Survey: Almost Half of Companies Lack Measures to Recruit IT Security Specialists
This release comes with backup support for Microsoft Planner.
Professional hackers are quick to learn about security vulnerabilities and conduct attacks within 24 hours to find new entry points into corporate networks.
German companies recorded losses averaging 4.9 million euros per case.
Generative AI can precisely capture the behavior and preferences of individual business customers and respond to them immediately, says Robert Rosellen from ServiceNow.
The apology is addressed to the company's customers and those affected, such as air travelers. A faulty update for the Falcon security software causes Windows computers to enter a boot loop.
A Kaspersky study of C-level decision-makers shows that only 22% are considering internal company rules on the use of AI.
Study: More than half of DACH companies now have a policy. Total cost of cyber insurance is rising.
Bring your own device" may sound like device chaos and security gaps to old-school IT experts. But that doesn't have to be the case, says André Schindler from NinjaOne.
Autonomous pentests from the cloud can be used to identify vulnerabilities.