Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Data Stealer SparkCat
Kaspersky experts have discovered a new Trojan hidden in apps in the AppStore and Google Play that has been active since at least March 2024.
Definition, tasks and salary
Cyber attacks, data theft and physical threats affect companies on a daily basis. That’s why the role of the Chief Security Officer (CSO) is more important than ever. But what exactly is behind this title?
Juniper Research: Quantum Key Distribution Market: 2025-2030
Quantum Key Distribution is revolutionizing IT security. The technology uses quantum mechanics for tap-proof communication. Juniper Research forecasts a market volume of 7.3 billion dollars by 2030.
Digital identity | Blockchain
Centralized digital identity systems have had their day – they are vulnerable to attacks, cost-intensive and rob users of control over their data. Technical Evangelist Debanjali Ghosh explains how blockchain technology is revolutionizing the management of digital identities.
Not responding to blackmail
Japanese electronics manufacturer Casio has published new details on the ransomware incident from October 2024. Following the conclusion of the investigation, it is now clear that the personal data of around 8,500 people was compromised.
Operation DreamJob
Lazarus’ key operation – “Operation DreamJob” – continues to evolve with new sophisticated tactics that have persisted for more than five years, according to Kaspersky’s Global Research and Analysis Team.
Quantum computer
Quantum computers will fundamentally change the way we look at humanity’s most complex problems. They promise new insights, from materials science to medicine and climate research. However, this future technology is also challenging established standards in cyber security.
Falsified reality
Everyone has heard or read about them, and some people may even have fallen for them: Deepfakes are increasingly blurring the boundaries between reality and fiction and pose a significant threat to the reliability of our digital identity.
GELITA AG
Memmingen, Göppingen
Systerra Computer GmbH
Wiesbaden
Meistgelesene Artikel
19. Januar 2026
12. Januar 2026
8. Januar 2026
30. Dezember 2025