Search
Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Ad
Definition, tasks and salary
Cyber attacks, data theft and physical threats affect companies on a daily basis. That’s why the role of the Chief Security Officer (CSO) is more important than ever. But what exactly is behind this title?
Ad
Digital identity | Blockchain
Centralized digital identity systems have had their day – they are vulnerable to attacks, cost-intensive and rob users of control over their data. Technical Evangelist Debanjali Ghosh explains how blockchain technology is revolutionizing the management of digital identities.
Quantum computer
Quantum computers will fundamentally change the way we look at humanity’s most complex problems. They promise new insights, from materials science to medicine and climate research. However, this future technology is also challenging established standards in cyber security.
Complexity of operations
Since 2023, Earth Estries has evolved into one of the most aggressive Chinese advanced persistent threat (APT) groups, primarily targeting critical industries such as telecommunications companies and government agencies in the US, Asia-Pacific, the Middle East and South Africa.
Ad
Nearest Neighbor Attack
The Russian hacker group ATP28 has attacked a US company using a new technique called “Nearest Neighbor Attack” and gained remote access to its Wi-Fi network.
Ubuntu Server
Researchers from the Qualys Threat Research Unit have discovered five vulnerabilities in the Ubuntu standard component “needrestart”. The vulnerabilities allow local privilege escalation (LPE) on affected systems.
Identity-based threats
Zscaler and Okta have unveiled four new integrations designed to accelerate zero trust transformation for their joint customers. These new solutions are designed to provide contextual end-to-end security.
Ad
17.03.2026
 - 18.03.2026
Hamburg
18.03.2026
 - 19.03.2026
Berlin
21.04.2026
 - 22.04.2026
Nürnberg
Ad

Most Read Articles

Ad
Ad
Ad