Tag: resilience
-
Bytes shows resilience in first half of 2025
Channel player Bytes shares trading update covering its first half, with the business remaining on track First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366631479/Bytes-shows-resilience-in-first-half-of-2025
-
Fit für den Ernstfall: MDR als Gamechanger für Ihre Cyber-Resilienz
Betriebsstörungen sind teuer und schaden dem eigenen Image. Unternehmen sollten daher eine präventive IT-Sicherheitsstrategie implementieren, bevor Cyberkriminelle den Geschäftsbetrieb zum Erliegen bringen. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/business-security/fit-fur-den-ernstfall-mdr-als-gamechanger-fur-ihre-cyber-resilienz/
-
Where CISOs need to see Splunk go next
Tags: ai, api, automation, cisco, ciso, cloud, communications, compliance, conference, crowdstrike, cybersecurity, data, data-breach, detection, finance, framework, google, incident response, intelligence, jobs, metric, microsoft, open-source, RedTeam, resilience, risk, router, siem, soar, strategy, tactics, threat, tool, vulnerabilityResilience resides at the confluence of security and observability: There was also a clear message around resilience, the ability to maintain availability and recover quickly from any IT or security event.From a Cisco/Splunk perspective, this means a more tightly coupled relationship between security and observability.I’m reminded of a chat I had with the chief risk…
-
BarracudaONE soll Cyber-Resilienz steigern – Barracuda launcht KI-gestützte Cybersicherheitsplattform
First seen on security-insider.de Jump to article: www.security-insider.de/barracuda-launcht-ki-gestuetzte-cybersicherheitsplattform-a-4e9359a3deb3f7e7f290e944e9fad00e/
-
Build Cyber Resilience With a Control Assessment – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/build-cyber-resilience-with-a-control-assessment-kovrr/
-
Build Cyber Resilience With a Control Assessment – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/build-cyber-resilience-with-a-control-assessment-kovrr/
-
From Quantum Hacks to AI Defenses Expert Guide to Building Unbreakable Cyber Resilience
Quantum computing and AI working together will bring incredible opportunities. Together, the technologies will help us extend innovation further and faster than ever before. But, imagine the flip side, waking up to news that hackers have used a quantum computer to crack your company’s encryption overnight, exposing your most sensitive data, rendering much of it…
-
15 Millionen Euro Strafe? Was der Cyber Resilience Act für Tech-Unternehmen bedeutet
First seen on t3n.de Jump to article: t3n.de/news/15-millionen-euro-strafe-was-der-cyber-resilience-act-fuer-tech-unternehmen-bedeutet-1706004/
-
Critical Bugs in Chaos Mesh Enable Cluster Takeover
Chaotic Deputy is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/critical-bugs-chaos-mesh-cluster-takeover
-
Team-Wide VMware Certification: Your Secret Weapon for Security
One VMware-certified pro is a win. An entire certified team? That’s a security multiplier. VMUG Advantage makes team-wide certification practical”, building collaboration, resilience, and retention. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/team-wide-vmware-certification-your-secret-weapon-for-security/
-
From prevention to rapid response: The new era of CISO strategy
Tags: access, attack, authentication, automation, awareness, breach, ciso, control, credentials, cybersecurity, data, finance, fintech, infrastructure, Intruder, malicious, monitoring, network, privacy, radius, resilience, service, strategy, threat, zero-trustBreaches will happen, so how do we deal with the fallout?CISOs are now spending less energy trying to keep every threat at bay. They know attackers will get in, but the question is, what’s next? The new mindset is about stopping intruders from moving around and escalating the damage.This shift means investing in sharper visibility,…
-
Improve Your Cyber Resilience with Data Security Platformization
Tags: access, ai, attack, breach, business, cloud, compliance, computing, container, control, cyber, cybersecurity, data, defense, detection, encryption, ibm, infrastructure, mitigation, resilience, risk, software, strategy, threat, toolImprove Your Cyber Resilience with Data Security Platformization madhav Tue, 09/16/2025 – 05:14 Data Security Lynne Murray – Director of Product Marketing for Data Security More About This Author > Today’s organizations are drowning in the growth of many different cybersecurity tools”, an unintended consequence of trying to keep up with an evolving threat landscape.…
-
Softwarestücklisten als Schlüssel zur digitalen Resilienz
Die Software Bill of Materials (SBOM) ist in Unternehmen noch nicht weit verbreitet, wird aber durch den Cyber Resilience Act (CRA) bald zum Standard. Viele Firmen stehen noch am Anfang und können mit SBOMs ihre Cyberresilienz stärken. Immer mehr Geräte sind mit dem Internet verbunden, vom Smart Home bis zur Industrie 4.0, und… First seen…
-
Why 47-day SSL/TLS certificates can be used as a driver for crypto agility
SSL/TLS certificates are no longer just a technical detail, they’re now a strategic driver of crypto agility. With certificate lifespans shortening to just 47 days by 2029, organizations must adopt automation, certificate visibility, and lifecycle management to stay secure. This shift, alongside the coming impact of quantum computing, forces leadership to treat certificate agility as…
-
Abwehrfähigkeit und Resilienz stärken – Gesetzentwurf zum KRITIS-Dachgesetz ist beschlossen
First seen on security-insider.de Jump to article: www.security-insider.de/kritis-dachgesetz-einheitliche-standards-kritische-infrastrukturen-a-f85e339c15e5b318878e3d1cf12e6daa/
-
New ransomware Yurei adopts open-source tools for double-extortion campaigns
Tags: access, attack, authentication, backup, breach, ciso, cloud, control, data, edr, extortion, flaw, intelligence, Internet, mfa, network, open-source, phishing, powershell, ransomware, resilience, risk, service, switch, threat, tool, windowsBigger risks beyond downtime: The double-extortion ransomware appears to be an early version, as it has loopholes. Ransomware often targets and deletes shadow copies to block victims from using Windows’ built-in recovery options. But Yurei did not delete the shadow copies, which, if enabled, can allow the victim to restore their files to a previous…
-
Your SOC is the parachute, Will it open?
Tags: ai, automation, breach, cyber, cybersecurity, data, detection, exploit, finance, resilience, risk, soc, threat, tool, updateComplexity is the enemy of resilience: I recently had a fascinating conversation with a friend in Cambridge. We were debating what’s wrong with cybersecurity, and he said something that stuck with me: “The answer is simple if it’s done very well.”It echoes a point I explored in a collaborative essay with Abbas Kudrati: Cyber Security…
-
Neues Reputationsranking: Deutsche IT-Sicherheitsfirmen wenig sichtbar ausländische Anbieter dominieren
Tags: resilienceSchwache Management-Sichtbarkeit gefährdet Reputation: IT-Security-Unternehmen nutzen ihr Management kaum als Stimme im öffentlichen Diskurs. Nachhaltigkeit bleibt Randthema: Trotz wachsender Bedeutung für Vertrauen und Resilienz spielt sie bei Security-Unternehmen und Systemintegratoren bisher nur eine Nebenrolle. Arbeitgeberattraktivität unterbewertet: Fachkräftemangel trifft auf geringe öffentliche Wahrnehmung als Arbeitgebermarke. Deutsche Anbieter von IT-Sicherheitslösungen fallen im internationalen Vergleich zurück. Das… First…
-
Cybersecurity Snapshot: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program’s Future
Tags: access, ai, api, attack, automation, best-practice, breach, bug-bounty, business, cisa, cloud, communications, computer, control, cve, cyber, cybersecurity, data, data-breach, defense, encryption, exploit, framework, google, governance, government, identity, infrastructure, intelligence, international, Internet, linkedin, mitre, network, nist, office, open-source, privacy, programming, RedTeam, resilience, risk, risk-management, service, skills, software, strategy, tactics, technology, threat, tool, update, vulnerabilityCheck out Tenable’s report detailing challenges and best practices for cloud and AI security. Plus, CISA rolled out a roadmap for the CVE Program, while NIST updated its guidelines for secure software patches. And get the latest on TLS/SSL security and AI attack disclosures! Here are five things you need to know for the week…
-
Ransomware, vendor outages, and AI attacks are hitting harder in 2025
Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear analysis from Resilience shows how these … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/12/resilience-2025-cyber-risk-trends/
-
So rechtfertigen Sie Ihre Security-Investitionen
Tags: ai, ciso, cloud, compliance, cyberattack, cybersecurity, cyersecurity, Hardware, infrastructure, resilience, risk, saas, service, strategy, tool, vulnerability, zero-trustLesen Sie, welche Aspekte entscheidend sind, um die Investitionen in die Cybersicherheit im Unternehmen zu rechtfertigen.In modernen Unternehmensumgebungen werden Investitionen in Sicherheitstechnologien nicht mehr nur anhand ihres technischen Reifegrades beurteilt. Die Finanzierung hängt vermehrt davon ab, inwieweit sich damit Umsatz generieren lässt, Risiken gemindert und Mehrwerte für Aktionäre geschaffen werden. Von CISOs wird erwartet, dass…
-
So rechtfertigen Sie Ihre Security-Investitionen
Tags: ai, ciso, cloud, compliance, cyberattack, cybersecurity, cyersecurity, Hardware, infrastructure, resilience, risk, saas, service, strategy, tool, vulnerability, zero-trustLesen Sie, welche Aspekte entscheidend sind, um die Investitionen in die Cybersicherheit im Unternehmen zu rechtfertigen.In modernen Unternehmensumgebungen werden Investitionen in Sicherheitstechnologien nicht mehr nur anhand ihres technischen Reifegrades beurteilt. Die Finanzierung hängt vermehrt davon ab, inwieweit sich damit Umsatz generieren lässt, Risiken gemindert und Mehrwerte für Aktionäre geschaffen werden. Von CISOs wird erwartet, dass…
-
Cybersicherheit im Fokus: Warum Resilienz und Kontrolle neu priorisiert werden müssen
Digitale Angriffe treffen heute ganze Organisationen und wirken tief in deren Systeme hinein. Sie zielen nicht nur auf kritische Infrastrukturen, sondern auf Unternehmen aller Branchen. Damit wächst der Druck auf Verantwortliche, ihre Sicherheitsstrategien neu auszurichten. Die entscheidende Frage lautet: Wie lassen sich Widerstandsfähigkeit und digitale Souveränität dauerhaft gewährleisten? Anfang Juni herrscht bei den Kliniken… First…
-
Why Cyber Resilience Starts With People, Not Just Tools
Fletcher Heisler, CEO of Authentik Security, covers the evolution of Identity and Access Management (IAM) and its significance in modern security. Fletcher also emphasizes a careful approach to AI integration, prioritizing human coding. Heisler, who has been working in tech since his early days experimenting with security in less-than-sanctioned ways, shares his journey into the..…
-
Wege zur digitalen Widerstandskraft – So erreichen Unternehmen Cyber-Resilienz
First seen on security-insider.de Jump to article: www.security-insider.de/cyber-resilienz-unternehmen-angriffe-a-f31fddd665c76f5427cfd51c475244dd/
-
Rethinking Security Data Management with AI-Native Pipelines
In this blog, you’ll learn why legacy pipelines fail modern SOC needs, how AI-native pipelines cut manual work, and how security teams gain cost savings, resilience, and faster threat response with adaptive, context-aware data management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/rethinking-security-data-management-with-ai-native-pipelines/
-
Rethinking Security Data Management with AI-Native Pipelines
In this blog, you’ll learn why legacy pipelines fail modern SOC needs, how AI-native pipelines cut manual work, and how security teams gain cost savings, resilience, and faster threat response with adaptive, context-aware data management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/rethinking-security-data-management-with-ai-native-pipelines/
-
New Tenable Report: How Complexity and Weak AI Security Put Cloud Environments at Risk
Tags: access, ai, attack, authentication, breach, cloud, control, credentials, cyber, cybersecurity, data, governance, iam, identity, least-privilege, metric, mfa, monitoring, resilience, risk, security-incident, skills, software, strategy, threat, toolThis survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a unified view of risk and mature identity governance. Key takeaways Organizations are…

