Data

Protecting the Cloud From LAPSUS$-like Threats

Protecting the Cloud from lapsus$ like

With high-profile attacks on Microsoft, Okta, and other major tech companies, cybercrime group LAPSUS$ made headlines a few months ago. UK police have since arrested seven suspected members, aged between 16 and 21, but does that mean the threat has been averted? Certainly not: similar attacks can and will follow. Therefore, it is worth taking …

Protecting the Cloud From LAPSUS$-like Threats Read More »

The EU’s Vision of A Secure Cyberspace

Secure Cyberspace

Seemingly, there are always new directives and regulations with which the EU wants to make cyberspace more secure and privacy-friendly. The multitude of legal instruments can be better understood by knowing the EU’s basic cybersecurity vision and strategy. We provide an overview to guide the EU’s cyber strategy. Whether it’s cloud computing or artificial intelligence …

The EU’s Vision of A Secure Cyberspace Read More »

Expert Panel Discusses Critical Infrastructure Security

Cyberattacks are now part of strategic warfare, and the war in Ukraine has brought concerns about critical infrastructure security breaches into focus. What is the state of IT security at CRITIS companies? That’s what an expert panel of policymakers, infrastructure operators, and IT security professionals recently addressed. From awareness and recruiting to changes in the …

Expert Panel Discusses Critical Infrastructure Security Read More »

Sustainable Learning with Gamification and Storytelling

Sustainable Learning with Gamification and Storytelling -

Today, it takes more than just protective technologies to fend off cyberattacks. Attentive employees can prevent attempted attacks via phishing or social engineering at an early stage by adopting the right behavior. Security awareness training can improve awareness of cyber risks among the workforce. Modern training courses rely on gamification and storytelling. Can you still …

Sustainable Learning with Gamification and Storytelling Read More »

Strengthening Network Resilience with AIOps and Observability

improving network resilience

The message was clear when the U.S. National Science Foundation announced it was launching a new program to bring resilience to next-generation networks. In an increasingly interconnected world, there may be no outages or degradation of communications networks after a potential attack. You can’t even afford human error. Before the Resilient and Intelligent Next-Generation Systems …

Strengthening Network Resilience with AIOps and Observability Read More »

Companies Invest in Software Supply Chain Security

supply chain cyber security

A new survey of 350 application development, information technology and cybersecurity decision makers shows that 34 percent of the companies surveyed had a known open source software vulnerability exploited in their applications in the past 12 months, and 28 percent had been affected by a previously unknown (“zero-day”) vulnerability. Seventy-three percent of respondents have significantly …

Companies Invest in Software Supply Chain Security Read More »

Cyber Threats to Midsize Businesses on The Rise

small business cyber threats

The coronavirus has triggered a “digital pandemic.” Medium-sized businesses, in particular, have become a greater focus for cybercriminals because security measures in many places are inadequate. To protect data, companies cannot rely on pre-pandemic protocols, policies, and infrastructures and must implement appropriate identity and access management solutions. Cyberattacks incur high costs that can bankrupt small …

Cyber Threats to Midsize Businesses on The Rise Read More »

The Color of Security: Working Safely with Last Pass

How to combine the new IT security requirements of companies with a good user experience for employees – safe and relaxed working is the goal. With cybercrime threats still growing steadily, the question of how to make enterprise collaboration not only more secure, but also more relaxed, arises more than ever. This applies to employees …

The Color of Security: Working Safely with Last Pass Read More »

How to Implement The KRITIS regulation Securely and In Compliance with The Law?

How to Implement The KRITIS regulation Securely and In Compliance with The Law

The renewed Critical Infrastructure Protection Ordinance (KritisV) has been in force since the beginning of the year. It obliges operators to secure their systems appropriately and in accordance with the state of the art. In this interview, Matthias Reidans from Rosenberger OSI answers which points have to be considered on the way to a secure …

How to Implement The KRITIS regulation Securely and In Compliance with The Law? Read More »

Convergence vs. Security in Industry 4.0

Convergence vs. Security in Industry 4.0

After digitization initially affected business operations and processes (including sales and marketing activities, higher-level planning processes and information systems for corporate management) in many companies and, as of today, is in use across all industries, the comprehensive digitization of production processes often lags behind. The concepts of Industry 4.0, which have been propagated for more …

Convergence vs. Security in Industry 4.0 Read More »