Nationwide cyber attack in the USA
The series Zero Day deals with the current cyber threat landscape and addresses the consequences of a large-scale cyberattack in the USA. For exactly one minute, electricity, mobile networks, server systems, traffic control systems, and air traffic control systems fail simultaneously across the entire country. The attack costs over
Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Ad
Definition, tasks and salary
Cyber attacks, data theft and physical threats affect companies on a daily basis. That’s why the role of the Chief Security Officer (CSO) is more important than ever. But what exactly is behind this title?
Ad
Falsified reality
Everyone has heard or read about them, and some people may even have fallen for them: Deepfakes are increasingly blurring the boundaries between reality and fiction and pose a significant threat to the reliability of our digital identity.
Ubuntu Server
Researchers from the Qualys Threat Research Unit have discovered five vulnerabilities in the Ubuntu standard component “needrestart”. The vulnerabilities allow local privilege escalation (LPE) on affected systems.
Interview
Ulrich Parthier, Publisher of it security, spoke with John Kindervag, Chief Evangelist at Illumio and Founder of Zero Trust, about Zero Trust and its role in the face of current cyber threats.
Ad
Winners honored at "it-sa 2024"
The winners of the it security Awards 2024 have been announced. They were awarded in the categories Management Security, Internet/Web Security, Cloud Security and IAM. The following manufacturers were honored: Abstract Security, Lasso Security, BxC-Consulting and Nokod Security.
CRA
The Cyber Resilience Act (CRA) has been officially adopted by the European Union and heralds a new era of cybersecurity regulation for those companies that manufacture or sell products with digital components in the EU.
it-sa Special
In the increasingly digitalized industrial landscape, the challenges in cybersecurity have grown considerably in recent years. The increase in targeted cyberattacks on operational technology (OT), i.e. control systems, devices and components in production facilities, is particularly worrying. OT and IT must work closely together to ensure effective cybersecurity.
Ad

Events

Veranstaltungen

21.05.2025
 - 23.05.2025
Berlin

Most read articles.

Ad
Ad
Ad
Ad