Goes faster than you think
With modern IT security technologies, companies can quickly implement Zero Trust solutions.
Three examples show how they enable their employees to safely access cloud applications and company-owned applications from anywhere and surf the web without risk.
Statement
When it comes to the duration of a ransomware attack and the subsequent recovery process, the numbers are staggering and vary widely. This is partly due to the fact that there is no single source that summarizes all the information in a uniform way.
Study on cyber security in companies
In today’s digitally networked world, companies are increasingly the target of cyber attacks.
Attackers are primarily targeting managers, who are a particularly attractive target group due to their access to sensitive data and extensive rights within IT systems.
What to do if data has been published on the dark web?
Sensitive personal or company data is increasingly ending up in the dark corners of the internet, where it can be exploited by hackers.
Dark Web Monitoring offers IT managers an early warning system for data leaks and helps them to detect data breaches in good time and take countermeasures.
Study
Fortinet has published its 2024 Global Cybersecurity Skills Gap Report published.
The report highlights the ongoing challenges of the global cybersecurity skills shortage.
NIS2 as a real opportunity
Nobody likes to follow instructions – even if they are common sense – as long as there is no obligation to do so.
Inclusion of esports in the Olympic Games
Check Point dedicated itself to a video game theme to coincide with Gamescom in Germany with over 320,000 visitors.
Onapsis study
Onapsis publishes its new study “ERP security in times of AI-supported ransomware”.
The results are based on a survey of 500 cybersecurity decision-makers in companies with 500 or more employees in the DACH region and the UK.
The Sophos X-Ops team has disclosed a new attack variant of the Qilin ransomware group.
As part of a recent investigation into a Qilin ransomware attack, the Sophos X-Ops team discovered that the attackers stole credentials stored in Google Chrome browsers on certain network endpoints.
Sekretariat der Ständigen Konferenz der Kultusminister der Länder in der Bundesrepublik Deutschland
Bonn
Meistgelesene Artikel
1. Dezember 2025
1. Dezember 2025
19. November 2025
19. November 2025
15. November 2025