Suche
Anzeige
Quantencomputer
Die Aussicht auf leistungsfähige Quantencomputer ist nicht nur ein Forschungsthema, sie verändert die Risikolage in der IT-Security grundlegend. Denn was heute als sicher verschlüsselt gilt, kann in einigen Jahren unter Umständen entschlüsselt werden.
Anzeige
Resilienz für das KI-Zeitalter aufbauen
Unternehmen auf der ganzen Welt setzen zunehmend auf Künstliche Intelligenz (KI), denn sie sorgt für teils erhebliche Effizienzsteigerungen. Gleichzeitig nutzen Hacker sie, um ihre Angriffe raffinierter zu gestalten, zu skalieren oder zu automatisieren.
OPSWAT Threat Landscape Report 2025
A new report demonstrates that conventional security systems are failing to identify many contemporary threats. OPSWAT highlights critical blind spots in current defenses and advocates for a fundamental overhaul of cybersecurity strategies.
Strategy, opportunities and risks of the digital transformation
Through targeted acquisitions, massive investments in AI and the clever linking of cloud services with security solutions, the Group is conquering a market that was traditionally dominated by specialists. This development promises companies cost benefits and simplified management – but at the same time raises questions about dependencies and
Anzeige
Thousands of SAP applications at risk
Security experts have identified a serious security vulnerability in SAP NetWeaver that allows unauthorized access to company systems. The vulnerability became known in April 2025 and specifically affects the Visual Composer component of SAP Java systems.
Rethinking security strategy
The days when cyber security was an afterthought are over. The EU Cyber Resilience Act (CRA) and the EU’s new Product Liability Directive make it clear: software must be secure from the outset. „Security by design“ is thus turning from a buzzword into a survival strategy. Cycode shows how
Nationwide cyber attack in the USA
The series Zero Day deals with the current cyber threat landscape and addresses the consequences of a large-scale cyberattack in the USA. For exactly one minute, electricity, mobile networks, server systems, traffic control systems, and air traffic control systems fail simultaneously across the entire country. The attack costs over
Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Anzeige
10.06.2026
 - 11.06.2026
Frankfurt am Main
16.06.2026
 - 17.06.2026
München-Unterhaching
30.06.2026
 - 01.07.2026
Berlin
Mittwald CM Service GmbH & Co. KG
Espelkamp
IT-Dienstleistungszentrum (ITDZ Berlin)
Berlin, Home Office
Heidelberger Druckmaschinen AG
Wiesloch
metiundo GmbH
Berlin
Deutsche Umwelthilfe e.V.
Radolfzell, Berlin
Anzeige

Meistgelesene Artikel

Anzeige
Anzeige
Anzeige
Anzeige