Tag: resilience
-
Warum ‘alles aus einer Hand” digital gefährlich ist
Tags: resilienceIn physischen Lieferketten haben Unternehmen über Jahrzehnte gelernt, was Abhängigkeit bedeutet. Wer nur einen Zulieferer hat, spart vielleicht Kosten bis genau dieser ausfällt. Deshalb ist Diversifikation heute kein Luxus mehr, sondern Standard: Zweitlieferanten, alternative Routen, strategische Redundanzen. Resilienz ist fest eingeplant. Digital dagegen beobachten wir das Gegenteil. Unternehmen konsolidieren ihre IT-Landschaften, setzen auf integrierte […]…
-
The British public need to be better prepared for emergencies | Letter
Tags: attack, china, cyber, data-breach, disinformation, iran, resilience, russia, supply-chain, threat, warfare<strong>Jean Coussins</strong> says a cross-party Lords committee has been tasked with coming up with a plan to normalise resilience in our everyday livesYour editorial (<a href=”https://www.theguardian.com/commentisfree/2026/may/01/the-guardian-view-on-britains-fragile-systems-when-global-shocks-hit-your-shopping-bill”>Britain’s fragile systems: when global shocks hit your shopping bill, 1 May) makes clear that the public need to be more fully informed about global threats and actively engaged in…
-
CISOs: Align cyber risk communication with boardroom psychology
Tags: breach, business, ciso, compliance, control, cyber, cybersecurity, data, finance, governance, psychology, resilience, risk, threat, updateStop reporting risk as a technical status update: Executives do not need a master class in threat modeling. They need to know what the business stands to lose.Risk has to be framed in terms boards already use to weigh other enterprise decisions: financial exposure, operational disruption, compliance consequences, legal risk and the cost of delay.…
-
Allianz gegen Ransomware in hybriden Umgebungen – NetApp und Commvault bündeln Cyber-Resilienz-Kräfte
First seen on security-insider.de Jump to article: www.security-insider.de/netapp-und-commvault-buendeln-cyber-resilienz-kraefte-a-6c5f0a2a6679556ddfa69755c578985d/
-
IT im Spannungsfeld zwischen Effizienz und Resilienz: Ganzheitliches Lieferketten-Management als Vorbild
Tags: resilienceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/it-spannungsfeld-effizienz-resilienz-lieferkette-management-vorbild
-
Masterclass Quantum: Hybrid Crypto Gains Ground for Security
Applied Quantum’s Kawin Boonyapredee, SpeQtral’s Cyril Tan on Hybrid Security. Hybrid cryptography is emerging as a practical path to quantum safety. Kawin Boonyapredee from Applied Quantum and Cyril Tan from SpeQtral said combining QKD and PQC builds resilience against future threats while balancing performance and security needs. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/masterclass-quantum-hybrid-crypto-gains-ground-for-security-a-31595
-
CISA pushes critical infrastructure operators to prepare to work in isolation
Tags: access, attack, backup, business, ceo, cisa, control, cyber, cybersecurity, endpoint, exploit, government, incident response, infrastructure, iran, network, resilience, service, technology, threat, vpnA familiar playbook under a new name: While the framing of CI Fortify is new, the underlying concepts are not. Several experts say the initiative largely repackages long-standing practices around disaster recovery, business continuity, and incident response, areas where many organizations have historically underinvested.”It looks to me like traditional business continuity planning, disaster recovery, and…
-
Webinar: Why MSPs must rethink security and backup strategies
Security breaches don’t just test your defenses”, they test your recovery. Join Kaseya in our upcoming webinar to learn how MSPs strengthen resilience with SaaS backups and BCDR to stay operational after attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/webinar-why-msps-must-rethink-security-and-backup-strategies/
-
Five Eyes spook shops warn rapid rollouts of agentic AI are too risky
Prioritize resilience over productivity, say CISA, NCSC and their friends from Oz, NZ, Canada First seen on theregister.com Jump to article: www.theregister.com/2026/05/04/five_eyes_agentic_ai_recommendations/
-
Five Eyes spook shops warn agentic is too wonky for rapid rollout
Prioritize resilience over productivity, say CISA, NCSC and their friends from Oz, NZ, Canada First seen on theregister.com Jump to article: www.theregister.com/2026/05/04/five_eyes_agentic_ai_recommendations/
-
Cybersouveränität ist das neue Geschäftsmodell für digitale Vertrauenswürdigkeit
Cybersouveränität wird zur Vorstandsagenda: Nicht Regulierung, sondern die veränderte Natur von Daten (Cloud, Echtzeit-Replikation, KI) macht Souveränität zum zentralen Hebel für digitale Vertrauenswürdigkeit. »Kontrolle« ist oft nur eine Illusion: Region-Settings, Verschlüsselung und Backups reichen nicht, wenn Policy-Steuerung, Key-Ownership und Recovery-Prozesse nicht transparent und unter Realbedingungen getestet sind. Resilienz = nachweisbare Wiederherstellbarkeit: Prävention bleibt Pflicht ……
-
RBI Cybersecurity Compliance Checklist for Fintech Organizations
Tags: compliance, cyber, cybersecurity, data, finance, fintech, framework, india, resilience, service, threatThe financial services ecosystem in India is undergoing rapid digital transformation, and fintech organizations sit at the center of this evolution. With increasing cyber threats targeting digital payments, lending platforms, and financial data, regulatory oversight has intensified. The Reserve Bank of India mandates a strong RBI cybersecurity framework that fintechs must follow to ensure resilience,……
-
White House questions tech industry on defensive AI use, cybersecurity resilience
Companies may be reluctant to answer some of the government’s questions, given the sensitive topics they address. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/white-house-oncd-ai-tech-industry-questions/819133/
-
FTAPI gibt CRA-Tipps für KMU: Cyber Resilience Act oft ein Buch mit 7 Siegeln
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/ftapi-cra-tipps-kmu-cyber-resilience-act
-
EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
IntroA sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers, and security analysts by impersonating administrative utilities they rely on for daily operations. By integrating Search Engine Order (SEO) First seen on thehackernews.com Jump to article:…
-
Machine identity management starts with Private PKI
Machine identity management is essential in cloud-native environments where machines outnumber humans. Private PKI provides the foundation for securely issuing and managing digital certificates, while certificate lifecycle management (CLM) automates processes, improves visibility, and prevents outages. Together, they enable organizations to scale securely, enforce policies, and maintain resilience across modern infrastructures. First seen on securityboulevard.com…
-
ODNI to CISOs on threat assessments: You’re on your own
Tags: access, ai, china, ciso, computer, control, credentials, cyber, cybercrime, data, defense, detection, disinformation, encryption, finance, framework, government, healthcare, identity, infrastructure, intelligence, iran, jobs, korea, metric, resilience, risk, russia, service, strategy, technology, theft, threat, tool, warfareThe bifurcated framework: Operational reporting vs. homeland focus: The report now operates on two distinct tracks that risk narrowing the threat horizon for CROs. In a departure from traditional probabilistic forecasting, the IC has transitioned toward active operational reporting. This shift prioritizes immediate success metrics, such as a significant drop in border encounters and fentanyl…
-
ODNI to CISOs on threat assessments: You’re on your own
Tags: access, ai, china, ciso, computer, control, credentials, cyber, cybercrime, data, defense, detection, disinformation, encryption, finance, framework, government, healthcare, identity, infrastructure, intelligence, iran, jobs, korea, metric, resilience, risk, russia, service, strategy, technology, theft, threat, tool, warfareThe bifurcated framework: Operational reporting vs. homeland focus: The report now operates on two distinct tracks that risk narrowing the threat horizon for CROs. In a departure from traditional probabilistic forecasting, the IC has transitioned toward active operational reporting. This shift prioritizes immediate success metrics, such as a significant drop in border encounters and fentanyl…
-
Bad Bots in the Agentic Age: What the 2026 Thales Bad Bot Report Reveals
Tags: ai, api, application-security, attack, automation, banking, business, container, control, crime, cyber, cybercrime, data, defense, detection, exploit, finance, fraud, identity, infrastructure, intelligence, Internet, LLM, malicious, monitoring, resilience, risk, service, threat, tool, vulnerabilityBad Bots in the Agentic Age: What the 2026 Thales Bad Bot Report Reveals josh.pearson@t“¦ Thu, 04/30/2026 – 07:31 The modern internet is becoming less human by the day. Bot traffic is increasing, and human traffic is shrinking. Malicious automated traffic is getting harder to spot. The Thales 2026 Bad Bot Report, now in it’s…
-
Cyber-Resilienz mit Echtzeit-Governance – Commvault erweitert DSPM auf strukturierte und KI-Daten
First seen on security-insider.de Jump to article: www.security-insider.de/commvault-erweitert-dspm-auf-strukturierte-und-ki-daten-a-04180df6ab7a5425f54ad764a257c693/
-
Adaptive Security Leadership in an Expanding Threat Surface
Tags: access, attack, automation, control, cyber, data, identity, least-privilege, resilience, risk, saas, service, technology, threat, zero-trustLast week I joined fellow security leaders at CISO Inspire Summit North for a panel discussion on The Expanding Threat Surface: Adaptive Security Leadership for 2026 and Beyond. It was a timely discussion, because the challenge facing security leaders today is not simply more threats. It is more connections, more dependencies, and more complexity. Suppliers, SaaS, identities, automation…
-
CyberAct Was KMUs jetzt tun müssen
Der Cyber-Resilience-Act (CRA) ist seit Dezember 2024 in Kraft. Doch für viele kleine und mittlere Unternehmen bleibt er ein Buch mit sieben Siegeln. Das ändert sich gerade: Ab September 2026 greifen die ersten Meldepflichten, und das deutsche Durchführungsgesetz, das die Umsetzung regeln soll, steckt in der Kritik. Verbände wie Teletrust bemängeln, dass die vorgesehene Unterstützung…
-
CyberAct Was KMUs jetzt tun müssen
Der Cyber-Resilience-Act (CRA) ist seit Dezember 2024 in Kraft. Doch für viele kleine und mittlere Unternehmen bleibt er ein Buch mit sieben Siegeln. Das ändert sich gerade: Ab September 2026 greifen die ersten Meldepflichten, und das deutsche Durchführungsgesetz, das die Umsetzung regeln soll, steckt in der Kritik. Verbände wie Teletrust bemängeln, dass die vorgesehene Unterstützung…
-
CyberAct Was KMUs jetzt tun müssen
Der Cyber-Resilience-Act (CRA) ist seit Dezember 2024 in Kraft. Doch für viele kleine und mittlere Unternehmen bleibt er ein Buch mit sieben Siegeln. Das ändert sich gerade: Ab September 2026 greifen die ersten Meldepflichten, und das deutsche Durchführungsgesetz, das die Umsetzung regeln soll, steckt in der Kritik. Verbände wie Teletrust bemängeln, dass die vorgesehene Unterstützung…
-
‘Fundamental tension’ undermines manufacturers’ cybersecurity
A simple security mistake caused roughly one-quarter of all financial losses in the sector in 2025, cybersecurity insurer Resilience said. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/manufacturing-cybersecurity-threats-resilience/818680/
-
‘Fundamental tension’ undermines manufacturers’ cybersecurity
A simple security mistake caused roughly one-quarter of all financial losses in the sector in 2025, cybersecurity insurer Resilience said. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/manufacturing-cybersecurity-threats-resilience/818680/
-
Cyber Resilience as Capital Planning: Quantifying Risk
<div cla For decades, the cybersecurity budgethas been treated as part of Operational Expenditure (OpEx), a necessary “tax” on doing business, much like insurance or electricity. Security leaders have traditionally fought for budgets based on fear, uncertainty, and doubt, often struggling to justify the return on investment for tools that ideally result in “no change”.…
-
DORA and the Practical Test of Operational Resilience
By Alan Stewart-Brown, VP EMEA, Opengear Disruption in financial services rarely follows a clean script. A misconfiguration, a spike in malicious traffic, or a poorly timed change can cascade across platforms and teams, particularly where systems and suppliers are tightly coupled. When that chain reaction starts, the challenge is rarely identifying the fault. It The…
-
DORA and the Practical Test of Operational Resilience
By Alan Stewart-Brown, VP EMEA, Opengear Disruption in financial services rarely follows a clean script. A misconfiguration, a spike in malicious traffic, or a poorly timed change can cascade across platforms and teams, particularly where systems and suppliers are tightly coupled. When that chain reaction starts, the challenge is rarely identifying the fault. It The…

