Tag: resilience
-
Verteidigung: Umfassende Resilienz gehört ins Zentrum der Sicherheitspolitik
Tags: resilienceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/verteidigung-resilienz-sicherheitspolitik
-
Week in review: Exploited newly patched BeyondTrust RCE, United Airlines CISO on building resilience
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: United Airlines CISO on building resilience when disruption is inevitable In … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/15/week-in-review-exploited-newly-patched-beyondtrust-rce-united-airlines-ciso-on-building-resilience/
-
Alert: ‘Severe Cyberthreat’ to Critical Infrastructure
Develop ‘Strong Resilience and Recovery Plans,’ Urges UK Cybersecurity Agency. Following Poland’s energy grid being targeted by Russian nation-state attackers, Britain has issued a severe cyberthreat alert to its domestic critical national infrastructure operators, urging them to refine their defensive and resilience posture ahead of any unexpected escalation in targeting. First seen on govinfosecurity.com Jump…
-
New NCSC-Led OT Security Guidance for Nuclear Reactors
Four Principles Positioning the Nuclear Ecosystem for Long-Term Cyber Resilience OT weaknesses are compounding across utilities, with 22% of critical infrastructure firms reporting OT incidents and external access driving half of breaches. U.K. NCSC’s new guidance outlines connectivity principles that utilities can embed to avoid costly retrofits and compliance issues. First seen on govinfosecurity.com Jump…
-
NDSS 2025 Density Boosts Everything
Tags: ai, attack, conference, cybersecurity, detection, Internet, malware, military, network, resilience, strategy, trainingSession 12B: Malware Authors, Creators & Presenters: Jianwen Tian (Academy of Military Sciences), Wei Kong (Zhejiang Sci-Tech University), Debin Gao (Singapore Management University), Tong Wang (Academy of Military Sciences), Taotao Gu (Academy of Military Sciences), Kefan Qiu (Beijing Institute of Technology), Zhi Wang (Nankai University), Xiaohui Kuang (Academy of Military Sciences) PAPER Density Boosts Everything:…
-
Why identity recovery is now central to cyber resilience
Tags: access, ai, authentication, backup, business, cloud, compliance, cyber, data, email, identity, infrastructure, least-privilege, radius, ransomware, resilience, risk, service, strategyIdentity resilience: Implement immutable backups and automated recovery for identity systems such as Active Directory.Zero-trust architecture: Apply least-privilege access and continuous authentication to reduce the blast radius of an attack.Automated orchestration: Limit manual steps in recovery workflows so teams can respond faster under pressure.Regulatory readiness: Make audit-ready reporting and compliance validation part of resilience planning, not an afterthought.AI-ready protection: Account…
-
Swiss Cyber Security Days Coreview stärkt Tenant-Resilienz und Souveränität
Coreview zeigt auf den diesjährigen Swiss Cyber Security Days (17. und 18. Februar 2026 in Bern) seine Lösung zur Verbesserung der Resilienz von Microsoft-365. Am Stand (Halle 2.2, Stand A22) zeigen die Spezialisten, wie man den M365-Tenant als zentralen Baustein von Unternehmensinfrastrukturen vor Manipulationen an Konfigurationen schützen, übermäßige Administratorenrechte begrenzen und die Betriebskontinuität auch in…
-
Swiss Cyber Security Days Coreview stärkt Tenant-Resilienz und Souveränität
Coreview zeigt auf den diesjährigen Swiss Cyber Security Days (17. und 18. Februar 2026 in Bern) seine Lösung zur Verbesserung der Resilienz von Microsoft-365. Am Stand (Halle 2.2, Stand A22) zeigen die Spezialisten, wie man den M365-Tenant als zentralen Baustein von Unternehmensinfrastrukturen vor Manipulationen an Konfigurationen schützen, übermäßige Administratorenrechte begrenzen und die Betriebskontinuität auch in…
-
Proactive strategies for cyber resilience with Wazuh
Cyber resilience means anticipating threats, detecting them early, and recovering fast when incidents occur. Wazuh shows how its open source SIEM and XDR unify visibility, detection, and automated response to strengthen proactive defense. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/proactive-strategies-for-cyber-resilience-with-wazuh/
-
Gartner-Prognose: Die sechs wichtigsten Cybersicherheits-Trends für 2026
Tags: ai, awareness, business, compliance, computing, cyberattack, cybersecurity, cyersecurity, framework, gartner, governance, resilience, risk, soc, tool, trainingLesen Sie, mit welchen Cybersecurity-Trends sich Unternehmen in diesem Jahr beschäftigen sollten.Auch im Jahr 2026 bleibt die Cybersicherheitslage angespannt. Doch was sind die wichtigsten Themen, Risiken und Chancen, mit denen sich Security-Entscheider aktuell befassen sollten?Das Marktforschungsunternehmen Gartner hat dazu folgende sechs Trends ermittelt: KI-Agenten werden zunehmend von Mitarbeitern und Entwicklern genutzt, wodurch neue Angriffsflächen entstehen.…
-
Schrödinger’s cat and the enterprise security paradox
Tags: control, cybersecurity, detection, exploit, framework, identity, intelligence, jobs, metric, penetration-testing, RedTeam, resilience, risk, siem, strategy, threat, tooland compromised. The dashboards might be green and the audit reports reassuring, but the uncomfortable reality is that you do not know your actual state until you observe it directly and often. Many readers will have heard of Schrödinger’s cat in passing, but the details blur over time, so it is worth revisiting what the…
-
Schrödinger’s cat and the enterprise security paradox
Tags: control, cybersecurity, detection, exploit, framework, identity, intelligence, jobs, metric, penetration-testing, RedTeam, resilience, risk, siem, strategy, threat, tooland compromised. The dashboards might be green and the audit reports reassuring, but the uncomfortable reality is that you do not know your actual state until you observe it directly and often. Many readers will have heard of Schrödinger’s cat in passing, but the details blur over time, so it is worth revisiting what the…
-
NIS2: Supply chains as a risk factor
Why supply chains are particularly vulnerable: The supply chain is an attractive target for attackers for several reasons. External partners often have privileged access, work with sensitive data, or are deeply integrated into operational processes. At the same time, they are often not subject to the same security standards as large organizations.Furthermore, there is a structural lack…
-
United Airlines CISO on building resilience when disruption is inevitable
Aviation runs on complex digital systems built for stability, safety, and long lifecycles. That reality creates a unique cybersecurity challenge for airlines, where disruption … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/09/deneen-defiore-united-airlines-aviation-cybersecurity-strategy/
-
Veeam ernennt Armin Müller zum Regional Vice President for Central Europe und beschleunigt damit das Wachstum von Data-Resilience und Channel
Veeam Software hat die Ernennung von Armin Müller zum Regional Vice President für Mitteleuropa bekannt gegeben. Mit mehr als 30 Jahren Erfahrung in den Bereichen Unternehmenssoftware, Cloud und Channel-Leadership wird Armin Müller die Geschäfte von Veeam in Zentraleuropa leiten und Unternehmen dabei helfen, robusten Datenschutz, Sicherheit und Business-Continuity zu erreichen. Bevor er zu Veeam […]…
-
Building trust with the board through evidence-based proof
Tags: backup, business, cio, ciso, compliance, control, cyber, cybersecurity, data, finance, governance, incident, insurance, mitigation, regulation, resilience, risk, strategy, tool, updateBuilding a common language to get to “Here’s the proof of cyber resilience”: CISOs can reframe the discussion using data and evidence. Modern cybersecurity tools produce a large volume of data and information on how they operate at any point in time, the status of controls deployed, the validation of configuration and more. There’s an…
-
Moderner OT-Resilienz: Digitale Zwillinge als wichtige Bausteine
Tags: resilienceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/modern-ot-resilienz-digital-zwilling-baustein
-
Moderner OT-Resilienz: Digitale Zwillinge als wichtige Bausteine
Tags: resilienceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/modern-ot-resilienz-digital-zwilling-baustein
-
Semperis Buys MightyID to Expand Identity Security
Acquisition Adds Okta and Ping Coverage to Semperis’ Identity Security Platform. Semperis has acquired MightyID to extend its identity-first security and cyber resilience strategy beyond Active Directory and Entra ID into Okta and Ping. CEO Mickey Bresman says the deal addresses customer demand for multi-identity provider protection backup recovery and migration. First seen on govinfosecurity.com…
-
Wiederherstellbarkeit von Backups automatisiert prüfen und absichern
Der Anbieter von Softwarelösungen für Business-Continuity, IT-Resilienz und Systemwiederherstellung, Cristie Data, präsentiert den <>. Mit der neuen Softwarelösung lassen sich Backup- und Wiederherstellungsprozesse automatisiert überprüfen. Der Cristie-Resilience-Booster scannt Wiederherstellungen kontinuierlich auf Bedrohungen und stellt sicher, dass Daten nicht nur gesichert, sondern im Ernstfall auch zuverlässig und sauber wiederhergestellt werden können. Dabei arbeitet die […] First…
-
Grundlegend: die Backup-Strategie – Mit verbesserter Resilienz durch ein herausforderndes Jahr 2026
First seen on security-insider.de Jump to article: www.security-insider.de/mit-verbesserter-resilienz-durch-ein-herausforderndes-jahr-2026-a-3c5c0869f045e60afea075ef0f015c0d/
-
Cybersecurity Report 2026: KI beschleunigt Angriffe und Abwehr – Warum Resilienz 2026 wichtiger wird als reine Prävention
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-report-2026-resilienz-praevention-a-4b79f754fc2cbf34f7664fce98f8d0d8/
-
Security Is Shifting From Prevention to Resilience
Dan Cole, senior vice president of product management at Sophos, unpacks how cybersecurity strategy is shifting from a prevention-first mindset toward resilience and response. Cole traces his career from the early days of mass malware outbreaks like Melissa and ILOVEYOU through today’s environment of nation-state actors, AI-assisted attacks, and sprawling hybrid workforces. While the tools..…
-
AI Governance in Cybersecurity: Building Trust and Resilience in the Age of Intelligent Security
Artificial intelligence is no longer a “nice to have” in cybersecurity it’s embedded everywhere. From detecting suspicious activity to responding to incidents in real time, AI now sits at the heart of modern security operations. But as organizations hand over more responsibility to intelligent systems, a tough question emerges: who’s really in control? This First…
-
Digitale Zwillinge als wichtige Bausteine moderner OT-Resilienz
Neben kontinuierlichem Exposure-Management braucht operative Resilienz in OT-Umgebungen konkrete technische und organisatorische Hebel: Zugangskontrollen, belastbare Testumgebungen und kompensierende Maßnahmen für Legacy-Systeme. Gleichzeitig rückt die Lieferkette als Angriffs- und Compliance-Faktor in den Mittelpunkt. Zugriffe managen und das Prinzip der minimalen Privilegien Eine zentrale Säule der modernen OT-Resilienz im Jahr 2026 ist die Durchsetzung des Zugriffs mit…
-
Outages Happen to Everyone. Building a Resilient Architecture Doesn’t Have to Be Hard.
Tags: access, ai, attack, breach, business, cloud, compliance, computing, container, control, csf, cyberattack, data, defense, detection, dora, encryption, finance, framework, government, nist, regulation, resilience, service, software, strategy, technologyOutages Happen to Everyone. Building a Resilient Architecture Doesn’t Have to Be Hard. madhav Tue, 02/03/2026 – 05:21 No company is spared the pain of outages. But their impact can be mitigated by how resilient you build your business architecture. And who you choose to partner with can significantly determine how effective that will be.…
-
IT Security
In a world where businesses are built on digital infrastructure, IT security has become a critical pillar of organizational resilience and trust. From cloud computing and remote workforces to SaaS applications and connected devices, modern IT environments are larger, more complex, and more exposed than ever before. At the same time, cyber threats are growing…
-
How risk culture turns cyber teams predictive
Tags: access, compliance, control, credentials, cyber, cybersecurity, data-breach, detection, identity, intelligence, jobs, ransomware, resilience, risk, serviceRisk culture: What it is when you strip the slogans: People talk about culture like it’s soft. Posters. Values. A town hall with applause on cue.Culture is harder. Culture is what people do when nobody is watching, and when the clock is loud. Culture is what gets you the truth at 4 p.m., not at…

