Suche
Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Anzeige
Definition, tasks and salary
Cyber attacks, data theft and physical threats affect companies on a daily basis. That’s why the role of the Chief Security Officer (CSO) is more important than ever. But what exactly is behind this title?
Anzeige
Juniper Research: Quantum Key Distribution Market: 2025-2030
Quantum Key Distribution is revolutionizing IT security. The technology uses quantum mechanics for tap-proof communication. Juniper Research forecasts a market volume of 7.3 billion dollars by 2030.
Digital identity | Blockchain
Centralized digital identity systems have had their day – they are vulnerable to attacks, cost-intensive and rob users of control over their data. Technical Evangelist Debanjali Ghosh explains how blockchain technology is revolutionizing the management of digital identities.
Not responding to blackmail
Japanese electronics manufacturer Casio has published new details on the ransomware incident from October 2024. Following the conclusion of the investigation, it is now clear that the personal data of around 8,500 people was compromised.
Anzeige
Operation DreamJob
Lazarus’ key operation – “Operation DreamJob” – continues to evolve with new sophisticated tactics that have persisted for more than five years, according to Kaspersky’s Global Research and Analysis Team.
Quantum computer
Quantum computers will fundamentally change the way we look at humanity’s most complex problems. They promise new insights, from materials science to medicine and climate research. However, this future technology is also challenging established standards in cyber security.
Falsified reality
Everyone has heard or read about them, and some people may even have fallen for them: Deepfakes are increasingly blurring the boundaries between reality and fiction and pose a significant threat to the reliability of our digital identity.
Complexity of operations
Since 2023, Earth Estries has evolved into one of the most aggressive Chinese advanced persistent threat (APT) groups, primarily targeting critical industries such as telecommunications companies and government agencies in the US, Asia-Pacific, the Middle East and South Africa.
Anzeige
02.03.2026
 - 04.03.2026
Dortmund
05.05.2026
 - 07.05.2026
Berlin
05.05.2026
 - 07.05.2026
Dubai
A.T.U Auto-Teile-Unger GmbH & Co. KG
Weiden in der Oberpfalz, Home Office
IT-Dienstleistungszentrum (ITDZ Berlin)
Berlin
Schwarz-Außenwerbung GmbH
Konstanz
Schwarz Corporate Solutions
Neckarsulm
Akkodis Germany Tech Experts GmbH
Dresden
Anzeige

Meistgelesene Artikel

Anzeige
Anzeige
Anzeige
Anzeige