Tag: resilience
-
Resilienz: Die unterschätzte Ressource im Datenschutzmanagement
Angesichts zunehmender geopolitischer Unsicherheiten, KI”‘gestützter Cyberangriffe und wachsender regulatorischer Anforderungen wird Cyberresilienz zu einer zentralen Voraussetzung wirksamen Datenschutzmanagements. Der Beitrag zeigt, warum rein reaktive Sicherheitsmaßnahmen nicht ausreichen und wie ein mehrschichtiger, systematischer Resilienzansatz den Schutz, die Verfügbarkeit und die Wiederherstellbarkeit von Daten nachhaltig stärkt. Cyberresilienz wird dabei als integraler Bestandteil moderner IT”‘ und Datenschutzarchitekturen verstanden,……
-
Cyber Resilience Act: BSI hat Vorsitz der AdCo CRA
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/cyber-resilience-act-bsi-vorsitz-adco-cra
-
TDL 018 – How To Think, Not What To Think – Mitch Prior
Tags: access, ai, apple, attack, backup, blockchain, business, cctv, china, ciso, cloud, computer, conference, control, credentials, cvss, cyber, cybersecurity, data, defense, detection, exploit, finance, firmware, google, infrastructure, intelligence, Internet, iot, jobs, law, mail, malware, military, network, phone, privacy, resilience, risk, router, software, strategy, switch, technology, threat, tool, vulnerability, wifi, zero-trustThe Human Algorithm in a Zero-Trust World In the latest episode of The Defender’s Log, host David Redekop sits down with cybersecurity expert Mitch Prior to discuss the intersection of high-tech security and human intuition. From their first meeting in 2018″, the early days of Zero Trust”, the duo explores why the “why” behind technical…
-
Einfluss der künstlichen Intelligenz auf die Cloud-Einführung, Budgets und IT-Resilienz
Suse hat seine Studie ‘Cloud and AI Pulse Survey” veröffentlicht. Sie belegt, dass immer mehr Unternehmen aus technischen und betrieblichen Gründen sowie im Hinblick auf die digitale Souveränität auf hybride (59 Prozent) und private (16 Prozent) Clouds umsteigen. Die global angelegte Umfrage unter fast 600 führenden Unternehmen im Technologiesektor in Deutschland, Großbritannien, den USA, Japan…
-
Cybercriminals are Winning with AI
AI has become the most powerful tool for financial fraud since the dawn of the Internet. As predicted, criminals are exploiting it faster, more effectively, and at scale. According to the latest Interpol Global Financial Fraud Report, AI-enhanced fraud is now 4.5 times more profitable than traditional schemes. That’s a significant shift and we’re still…
-
Ditch ‘big transformation’ cyber strategies for continuous improvement
As artificial intelligence reshapes the enterprise, CISOs must abandon risky big bang security transformation initiatives in favour of incremental changes to build cyber resilience First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640480/Gartner-Ditch-big-transformation-cyber-strategies-for-continuous-improvement
-
CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026
Austin, United States, March 19th, 2026, CyberNewswire Cybersecurity has entered a new phase, one defined less by reactive controls and more by continuous, intelligence-driven operations. As attack surfaces expand and adversaries increasingly leverage AI, the modern CISO is tasked with orchestrating resilience at scale. Amid this shift, CISO Whisperer has released its list of “Cybersecurity…
-
The True Cost of Cyber Downtime: A UK Board-Level Briefing
Tags: attack, backup, business, cloud, communications, compliance, control, cyber, cyberattack, data, finance, GDPR, governance, healthcare, infrastructure, insurance, monitoring, resilience, saas, service, supply-chain, technologyWritten by Sean Tilley, Senior Sales Director EMEA at 11:11 Systems  Cyber downtime carries measurable financial consequences, and those consequences are becoming clearer with each major incident. Research from 11:11 Systems shows that 78% of European organisations report losses of up to $500,000 per hour following a cyber-related outage, while 6% face costs exceeding £1 million per…
-
Cyber-Resilienz braucht Blick auf die ganze Systemarchitektur – Fünf Schichten für effektive Cyber-Resilienz
First seen on security-insider.de Jump to article: www.security-insider.de/cyber-resilienz-fuenf-schichten-systemarchitektur-a-ac66d343b7dd33833fd6ab3a242347bb/
-
CISOs rethink their data protection strategies
Tags: access, ai, attack, automation, breach, business, cisco, ciso, cloud, compliance, computing, control, cyber, data, defense, framework, governance, healthcare, identity, jobs, LLM, privacy, resilience, risk, service, strategy, technology, tool, zero-trustFactors driving strategy evaluations CISOs, security experts, and data practitioners cite the expanding use of AI in the enterprise as the main reason they’re rethinking their data protection strategies.”AI is exposing more sensitive information as [workers] are taking that information and typing it into LLMs,” says Errol Weiss, CSO at Health-ISAC.AI tools make it easy…
-
Ransomware’s Opening Play: Target Identity First
Ransomware attackers now target identity systems like Active Directory first. Learn how identity resilience can help you prevent and recover from attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/ransomware-resilience/
-
Interview: D360 Bank redefines cyber security for Saudi Arabia’s cashless future
Muath Alhomoud, director of cyber security at D360 Bank, discusses payment security, cloud resilience and the responsible use of AI in a hyper-connected financial ecosystem First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640362/Interview-D360-Bank-redefines-cyber-security-for-Saudi-Arabias-cashless-future
-
Inside Nevada’s Push for Secure Digital Government
Tags: ai, attack, cio, cybersecurity, data-breach, governance, government, identity, ransomware, resilienceState CIO Tim Galluzi on Identity Modernization, AI and Resident Services. The State of Nevada is accelerating its cybersecurity and digital modernization efforts after a major ransomware attack exposed the importance of resilience, workforce readiness and strong governance, said State CIO Tim Galluzi. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/inside-nevadas-push-for-secure-digital-government-a-31037
-
Notfall-Onboarding scheitert ohne die richtige Vorbereitung – DDoS-Resilienz entscheidet sich schon lange vor dem Angriff
First seen on security-insider.de Jump to article: www.security-insider.de/ddos-resilienz-notfall-onboarding-vorbereitung-mitigation-a-4b513bede48cbe6b3cfa9017f8280abd/
-
What it takes to win that CSO role
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, defense, finance, flaw, framework, google, identity, insurance, jobs, monitoring, network, resilience, risk, skills, startup, strategy, technology, threatGovern the explosion of shadow AI and establish guardrails for generative AI before it creates material data leakage.Move beyond prevention and operate as a business enabler, proving the organization can maintain a minimum viable business during a sustained outage.Address compliance burdens, such as SEC disclosure rules or the EU AI Act, not as a checklist,…
-
What it takes to win that CSO role
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, defense, finance, flaw, framework, google, identity, insurance, jobs, monitoring, network, resilience, risk, skills, startup, strategy, technology, threatGovern the explosion of shadow AI and establish guardrails for generative AI before it creates material data leakage.Move beyond prevention and operate as a business enabler, proving the organization can maintain a minimum viable business during a sustained outage.Address compliance burdens, such as SEC disclosure rules or the EU AI Act, not as a checklist,…
-
7 Wahrheiten über digitale Resilienz in der Sales Saison
Tags: resilienceDie Sales Season 2025/26 hat neue Rekorde gebrochen und damit die digitale Belastbarkeit vieler Systeme auf die Probe gestellt. Warum echte Resilienz erst nach dem Höhepunkt beginnt. First seen on it-daily.net Jump to article: www.it-daily.net/it-management/digitalisierung/7-wahrheiten-digitale-resilienz
-
When insider risk is a wellbeing issue, not just a disciplinary one
Tags: access, breach, compliance, control, cyber, data, exploit, finance, group, malicious, monitoring, resilience, risk, risk-management, security-incident, threat, training, vulnerabilityWritten by Katie Barnett, Director of Cyber Security at Toro Solutions Insider risk is still often framed around intent, with the focus placed on malicious employees, disgruntled contractors, or deliberate misuse of access for personal gain.Those cases exist and they matter, but they are rarely where risk first begins, and they do not reflect how…
-
When insider risk is a wellbeing issue, not just a disciplinary one
Tags: access, breach, compliance, control, cyber, data, exploit, finance, group, malicious, monitoring, resilience, risk, risk-management, security-incident, threat, training, vulnerabilityWritten by Katie Barnett, Director of Cyber Security at Toro Solutions Insider risk is still often framed around intent, with the focus placed on malicious employees, disgruntled contractors, or deliberate misuse of access for personal gain.Those cases exist and they matter, but they are rarely where risk first begins, and they do not reflect how…
-
Why Most DDoS Protection Fails: Solving for Continuity and Resilience
Most organisations assume DDoS (Distributed denial of service) protection is a box they’ve already ticked. If traffic spikes or an attack starts, the thinking goes, their provider will absorb it and move on. But in the real world it can be a different story. Many incidents aren’t caused by the scale of an attack alone,……
-
Mikrosegmentierung: Neue Strategie für Prävention, Resilienz und Sicherheit
Mittels automatisierter Mikrosegmentierung können Unternehmen die möglichen Folgen eines Cyberangriffs effizient und effektiv eindämmen. Zero Networks analysierte über einen Zeitraum von zwölf Monaten (Dezember 2024 bis Dezember 2025) etwa 3,4 Billionen Aktivitäten in 400 Unternehmensumgebungen. Ziel war es, zu verstehen, wie sich erfolgreiche Cyberangriffe nach dem ersten Zugriff weiterentwickeln. Das Ergebnis: Die gefährlichsten Aktivitäten… First…
-
How SMBs Can Proactively Strengthen Cybersecurity
Tags: access, attack, best-practice, business, ciso, compliance, control, cyber, cyberattack, cybercrime, cybersecurity, data, identity, infrastructure, resilience, risk, service, tool, updateCyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As cyberattacks are ramping up, specifically against Critical Infrastructure sectors, Small and Medium Businesses (SMBs) are feeling the pressure and asking what they can do to better protect themselves in reasonable ways. Don’t Accept Failure SMBs often feel overwhelmed when…
-
Cyber Resilience Act AI Automated Verification
Ensure EU Cyber Resilience Act compliance without slowing down AI-assisted development. Use SonarQube for automated AI code verification, SAST & SBOM generation. Secure your SDLC today. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/cyber-resilience-act-ai-automated-verification/
-
Cyber Resilience Act AI Automated Verification
Ensure EU Cyber Resilience Act compliance without slowing down AI-assisted development. Use SonarQube for automated AI code verification, SAST & SBOM generation. Secure your SDLC today. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/cyber-resilience-act-ai-automated-verification/
-
Decoding the White House Cyber Strategy: Why Resilience Matters Now
Tags: ai, cyber, cybersecurity, infrastructure, network, resilience, strategy, threat, usa, zero-trustAmerica’s new National Cyber Strategy sends a very clear message that cybersecurity is now about resilience, not just defense. The strategy emphasizes modernizing federal networks, protecting critical infrastructure, and deploying AI-enabled cybersecurity capabilities to detect and disrupt threats at scale. It also reinforces long-standing priorities such as Zero Trust architecture and secure supply chains. But……
-
Hybrid resilience: Designing incident response across on-prem, cloud and SaaS without losing your mind
Tags: access, authentication, business, cloud, communications, data, data-breach, group, identity, incident response, metric, mitigation, network, radius, resilience, saas, service, strategy, technology, updateSeverity is driven by customer impact, not by who is pagedWe maintain one current hypothesis, even if it is wrongWe keep one shared timeline that captures decisions, not just symptomsWe communicate on a predictable cadence, even when answers are incompleteEvery action has a named owner and an explicit “time we expect to learn”The biggest behavior…
-
Hybrid resilience: Designing incident response across on-prem, cloud and SaaS without losing your mind
Tags: access, authentication, business, cloud, communications, data, data-breach, group, identity, incident response, metric, mitigation, network, radius, resilience, saas, service, strategy, technology, updateSeverity is driven by customer impact, not by who is pagedWe maintain one current hypothesis, even if it is wrongWe keep one shared timeline that captures decisions, not just symptomsWe communicate on a predictable cadence, even when answers are incompleteEvery action has a named owner and an explicit “time we expect to learn”The biggest behavior…
-
The cyber perimeter was never dead. We just abandoned it.
Tags: access, advisory, authentication, awareness, backup, cisa, ciso, cloud, control, cyber, cybersecurity, data-breach, email, exploit, firewall, flaw, governance, government, Hardware, identity, infrastructure, Internet, resilience, risk, router, rust, service, software, strategy, technology, update, zero-trustIndustry has comforted itself with the idea that the perimeter is dead. It is not. What happened is far worse. We ignored the edge, let unsupported hardware decay in place, and effectively donated our perimeter to adversaries who were more than willing to accept it.The FBI’s Winter SHIELD effort is the operational side of the…

