Microsoft Research Asia recently presented an artificial intelligence called VASA-1, which is able to generate highly realistic deepfake videos from a single photo and an audio clip.
Efficient security strategy
Even the strongest IT system is only as strong as its weakest security vulnerability. Unfortunately, the number of such vulnerabilities is constantly increasing – in fact, it has more than tripled in the last ten years.
EU push
At a time when cyber threats are bigger and more sophisticated than ever, the European Union (EU) has taken an important step towards strengthening its digital defenses with the introduction of the Network and Information Security Directive (NIS2).
IDaaS-Plattform
Entrust announces the expansion of its portfolio: The Identity as a Service (IDaaS) platform will integrate identity verification and identity and access management into a single solution to combat deepfakes, phishing, account takeover attacks and other threats.
Study
A new study by Zscaler examines the current state of implementation of NIS 2. The results of a survey of 875 IT executives in Europe show a discrepancy between the confidence of European organizations to achieve compliance with the regulations and the understanding of the requirements.
Winners honored at "it-sa 2024"
The winners of the it security Awards 2024 have been announced. They were awarded in the categories Management Security, Internet/Web Security, Cloud Security and IAM. The following manufacturers were honored: Abstract Security, Lasso Security, BxC-Consulting and Nokod Security.
CRA
The Cyber Resilience Act (CRA) has been officially adopted by the European Union and heralds a new era of cybersecurity regulation for those companies that manufacture or sell products with digital components in the EU.
Ad
it-sa Special
In the increasingly digitalized industrial landscape, the challenges in cybersecurity have grown considerably in recent years. The increase in targeted cyberattacks on operational technology (OT), i.e. control systems, devices and components in production facilities, is particularly worrying. OT and IT must work closely together to ensure effective cybersecurity.
Ad
Goes faster than you think
With modern IT security technologies, companies can quickly implement Zero Trust solutions. Three examples show how they enable their employees to safely access cloud applications and company-owned applications from anywhere and surf the web without risk.
What to do if data has been published on the dark web?
Sensitive personal or company data is increasingly ending up in the dark corners of the internet, where it can be exploited by hackers. Dark Web Monitoring offers IT managers an early warning system for data leaks and helps them to detect data breaches in good time and take countermeasures.
Ad
NIS2 as a real opportunity
Nobody likes to follow instructions – even if they are common sense – as long as there is no obligation to do so.
NIS2 and Co.
Companies are currently facing a wave of new regulations in the area of IT security. These developments are a reaction to the increasing threats posed by cyber attacks and the growing importance of securing networks and infrastructures.
Ad

Events

Veranstaltungen

13.10.2025
 - 17.10.2025
Dubai World Trade Center
05.05.2026
 - 07.05.2026
Dubai

Most read articles.

Ad
Ad
Ad
Ad