Search
Criminals study cycles
Organisations assume cyber threats remain constant throughout the year, spreading risk evenly across all four quarters. This misconception leaves them vulnerable during a period when attackers are most active. 
Ad
Breakout time shrinks
Attackers now need an average of just 29 minutes to move laterally through a network after gaining initial access, a 65 percent acceleration compared to the previous year.
Ad
Sovereignty assessment check
Four approaches, one question: How sovereign is your IT really? We compare the digital sovereignty tools from Red Hat, SUSE, Deloitte, and Nextcloud and show what really matters when it comes to digital sovereignty.
PromptSpy: The malware that thinks
Security researchers at Slovak IT company ESET have discovered a new Android malware that actively leverages Google Gemini during live operation, marking the first time an Android threat has used generative AI not as a peripheral feature, but as its central control mechanism.
Ad
A free AI agent with no guardrails
The developments surrounding OpenClaw are generating equal parts fascination and serious security concern. The makings of a genuine enterprise nightmare are already visible.
Transparency alone is not enough
Operational resilience in OT environments requires concrete technical and organizational levers: access controls, robust test environments, and compensating measures for legacy systems. At the same time, the supply chain is moving to the center of attention as both an attack vector and a compliance factor.
Ad
17.03.2026
 - 18.03.2026
Hamburg
18.03.2026
 - 19.03.2026
Berlin
21.04.2026
 - 22.04.2026
Nürnberg
Ad

Most Read Articles

Ad
Ad
Ad