A software company's survey of IT and cybersecurity professionals showed that companies are willing to spend more money on cybersecurity. New security tools are a challenge for employees, but they ...
Looking back to 2024, the following can be seen: Windows computers in particular are the target of cyber threats. Attacks by Trojans increased by 33 percent and by Trojan droppers by as much as 150 ...
Keeper Security's Risk Management Dashboard allows administrators to keep an eye on the company's security. Dynamic benchmarks help them identify and assess vulnerabilities and threats in real time.
A new survey of hackers shows that AI is not only helping hackers become more efficient, but that AI itself is "ripe for exploitation." Rarely can you ask a hacker, "What do you think?" when it comes ...
The NIS2 Directive tightens the requirements for corporate cybersecurity. This means that companies with critical infrastructures have to invest heavily in security solutions and employee training.
This year, companies should make data security in the cloud a top priority given the increasing use of AI. Developing and implementing new security policies for AI tools will be an important measure ...
A recent study has shown that 40 percent of companies currently affected by AI-based attacks are unable to adequately defend themselves against them. They have significant gaps in their security ...
A leading provider of security keys for hardware authentication has introduced a new phishing-resistant solution for Microsoft ecosystems that eliminates passwords, empowers corporate employees and ...
The BSI has already issued the second highest warning level, orange, for the actively exploited vulnerabilities in FortiOS and FortiProxy. The zero-day vulnerability CVE-2024-55591 is rated 9.6 out of ...
Modern cloud SIEM is designed to provide real-time threat detection and efficient monitoring. Datadog's cloud SIEM relies on modern architectures and machine learning to better protect companies.
The test phase of the ePA - the electronic patient record - started on January 15th despite existing reports of possible security gaps. It is questionable why the developer gematik did not seek to ...
According to predictions from a leading cybersecurity solutions provider, companies will adapt their cybersecurity strategies in 2025: they will take the first steps towards quantum readiness and ...