Wenn Asset-Management versagt
Eine Reddit-Debatte offenbart: Die wahren Desaster der IT-Sicherheit lauern nicht in KI, sondern in „unsexy“ Problemen wie Asset-Management und Legacy-IT.
Quantencomputer
Die Aussicht auf leistungsfähige Quantencomputer ist nicht nur ein Forschungsthema, sie verändert die Risikolage in der IT-Security grundlegend. Denn was heute als sicher verschlüsselt gilt, kann in einigen Jahren unter Umständen entschlüsselt werden.
Resilienz für das KI-Zeitalter aufbauen
Unternehmen auf der ganzen Welt setzen zunehmend auf Künstliche Intelligenz (KI), denn sie sorgt für teils erhebliche Effizienzsteigerungen. Gleichzeitig nutzen Hacker sie, um ihre Angriffe raffinierter zu gestalten, zu skalieren oder zu automatisieren.
OPSWAT Threat Landscape Report 2025
A new report demonstrates that conventional security systems are failing to identify many contemporary threats. OPSWAT highlights critical blind spots in current defenses and advocates for a fundamental overhaul of cybersecurity strategies.
Strategy, opportunities and risks of the digital transformation
Through targeted acquisitions, massive investments in AI and the clever linking of cloud services with security solutions, the Group is conquering a market that was traditionally dominated by specialists. This development promises companies cost benefits and simplified management – but at the same time raises questions about dependencies and
Thousands of SAP applications at risk
Security experts have identified a serious security vulnerability in SAP NetWeaver that allows unauthorized access to company systems. The vulnerability became known in April 2025 and specifically affects the Visual Composer component of SAP Java systems.
Rethinking security strategy
The days when cyber security was an afterthought are over. The EU Cyber Resilience Act (CRA) and the EU’s new Product Liability Directive make it clear: software must be secure from the outset. „Security by design“ is thus turning from a buzzword into a survival strategy. Cycode shows how
Nationwide cyber attack in the USA
The series Zero Day deals with the current cyber threat landscape and addresses the consequences of a large-scale cyberattack in the USA. For exactly one minute, electricity, mobile networks, server systems, traffic control systems, and air traffic control systems fail simultaneously across the entire country. The attack costs over
Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Meistgelesene Artikel
12. Mai 2026