Marcelo Pinto from Senhasegura describes in an interview how generative AI can be used to protect IT environments.

Marcelo Pinto from Senhasegura describes in an interview how generative AI can be used to protect IT environments.
Those with bad intentions can develop and circulate malware themselves and wreak havoc, warns guest author René Claus of Arcserve.
Building an internal security operations centre is neither easy nor cheap. However, an external SOC also brings challenges, says Jochen Koehler of Ontinue.
In terms of data access, IoT devices pose an enormous security risk.
Microsoft is not living up to its key role as a hyperscaler, says Holger Dyroff of ownCloud.
Those who rely more on AI and automation shorten the life cycles of leaks by 81 days and reduce the follow-up costs per incident by 1.76 million euros.
Average cost of a data breach reaches all-time high of $4.45 million, warns guest author Martin J. Krämer of KnowBe4.
Vectra study shows: Almost all SOC analysts fear missing relevant security events.
Marco Eggerling from Check Point says that AI should be taught a kind of ethics catalogue right from the start so that it adheres to certain rules on its own.
Benchmarking Report by KnowBe4 shows: European organisations need to increase cyber defences.
Why newspapers are affected and what they should do to protect themselves is explained by Rehan Khan of Rabb IT Solutions.
Large gap between perception and reality of cyber security. 93 percent of respondents expect rise in attacks on cloud security.
Valentin Boussin of Tixeo explains why highly secure videoconferencing can mitigate one aspect of the threat of hacking.
Countering 2FA circumvention attempts requires strengthening it with additional measures, says guest author Sébastien Viou of Stormshield.
Laut einer Analyse von Cequence Security gehören Programmierschnittstellen zu den absoluten Top-Zielen für Angriffe aus dem Internet.
The role and responsibilities of CISOs are changing, but is the direction right? We asked Tyler Baker of Bitdefender.
Managing vulnerabilities is critical for any company.
The modalities and targets of cyberattackers has changed, warns guest author Lance Spitzner of the SANS Institute.
Threats in the smart home are due to weak security mechanisms of IoT hardware.
Telekom's smartphone app is designed to simplify communication in the healthcare sector.
Study: 86 % of German IT and cybersecurity managers have problems with their backup and recovery solutions.
Electronic patient record (ePA) to be mandatory from the end of 2024 / Discussion about the security of sensitive health data gains new momentum
The PassGAN tool analyzes 15.6 million passwords from real data leaks. It takes less than an hour for eight-digit passwords with numbers and upper and lower case letters.
Gartner: Nearly half of cybersecurity leaders will change jobs by 2025 / 25 percent of them will change careers
What does the collapse of Silicon Valley Bank mean for cybersecurity? A commentary by Arctic Wolf's Ian McShane.
Forscher der IMC FH Krems entwickelt Machine-Learning-Lösung, die Autounfälle simuliert. Im Zentrum der Aufmerksamkeit stehen Crashs mit autonomen Fahrzeugen.
Specialist for logistics and corporate real estate uses Microsoft Azure and SOC/SIEM from Telekom.
eco IT Security Survey 2023: IT experts see an intensification of the cyber threat situation due to the war in Ukraine.
Employee Security Index (ESI) Benchmark shows it takes an average of three months of training for employees to develop an adequate understanding of cybersecurity.
1,000 attacks per week on organizations - Geopolitical conflicts lead to increased emergence of "disruptive and destructive" malware.