Tag: resilience
-
Warum Harmonisierung, Interoperabilität und Resilienz im Mittelpunkt des überarbeiteten EU-Cybersicherheitsgesetzes stehen sollten
Brüssel stellt demnächst die Vorlage des überarbeiteten EU-Cybersicherheitsgesetzes vor. Damit bietet sich die Chance für stärkere Grundlagen und ein ehrgeizigeres Gesetz, das sich auf Interoperabilität konzentriert und die Cyberresilienz in der gesamten EU verbessert. Die Cybersicherheitsbranche hat seit der Verabschiedung des Gesetzes im Jahr 2019 enorme Veränderungen durchlaufen. Der weit verbreitete Einsatz von generativer KI…
-
Why the future of security starts with who, not where
Tags: access, attack, cisa, ciso, cloud, compliance, control, cybersecurity, data, framework, google, identity, mfa, monitoring, network, nist, passkey, password, resilience, risk, saas, wifi, zero-trustCloud + remote work = No perimeter: Now, with remote work and the cloud, there’s no real perimeter left. People connect from home Wi-Fi, personal laptops, airports, coffee shops, you name it. At the same time, company data and workloads are scattered across AWS, Azure, Google Cloud and various SaaS platforms. The old rules just…
-
Vertrauen, Ethik und Resilienz im Fokus: Der CISO der Zukunft übernimmt Führungsrolle
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/vertrauen-ethik-resilienz-fokus-ciso-zukunft-uebernahme-fuehrungsrolle
-
Aikido Gets $60M Series B to Scale, Automate AI Pen Testing
5x Revenue Growth, $1B Valuation Fuel Investment in Code Security Innovation. Backed by DST Global, Aikido Security’s $60 million Series B will fund global expansion and boost its AI-powered security tools. CEO Willem Delbare said the firm’s autonomous pen testing and code remediation cuts cost, boosts software resilience and already outperforms humans. First seen on…
-
Die künftige Rolle des CISO in der Cybersecurity
Die Rolle des Chief Information Security Officers (CISO) wird sich in den kommenden Jahren grundlegend verändern. Durch technologische, geopolitische und regulatorische Entwicklungen wandelt sich das Berufsbild von einer rein technischen Sicherheitsfunktion zu einer strategischen Führungsrolle, die Vertrauen, Ethik und Resilienz in den Mittelpunkt stellt. Ein Kommentar von Joeri Barbier, CISO bei Getronics. Ein entscheidender Faktor…
-
7 top cybersecurity projects for 2026
Tags: access, ai, api, attack, authentication, business, cisco, ciso, cloud, communications, compliance, control, credentials, cybersecurity, data, defense, detection, email, framework, governance, infrastructure, LLM, mail, phishing, programming, resilience, risk, software, strategy, technology, threat, tool, vulnerability, zero-trust2. Strengthening email security: Phishing continues to be a primary attack vector for stealing credentials and defrauding victims, says Mary Ann Blair, CISO at Carnegie Mellon University. She warns that threat actors are now generating increasingly sophisticated phishing attacks, effectively evading mail providers’ detection capabilities. “Legacy multifactor authentication techniques are now regularly defeated, and threat…
-
7 top cybersecurity projects for 2026
Tags: access, ai, api, attack, authentication, business, cisco, ciso, cloud, communications, compliance, control, credentials, cybersecurity, data, defense, detection, email, framework, governance, infrastructure, LLM, mail, phishing, programming, resilience, risk, software, strategy, technology, threat, tool, vulnerability, zero-trust2. Strengthening email security: Phishing continues to be a primary attack vector for stealing credentials and defrauding victims, says Mary Ann Blair, CISO at Carnegie Mellon University. She warns that threat actors are now generating increasingly sophisticated phishing attacks, effectively evading mail providers’ detection capabilities. “Legacy multifactor authentication techniques are now regularly defeated, and threat…
-
Southeast Asia CISOs Top 13 Predictions for 2026: Securing AI, Centering Identity, and Making Resilience Strategic
Innovation and technology, Hand of robot touching a padlock of security on network connection of business, Data exchange, Financial and banking, AI, Cyber crime and internet security. iStock/ipopba First seen on csoonline.com Jump to article: www.csoonline.com/article/4117844/southeast-asia-cisos-13-top-predictions-for-2026-securing-ai-centering-identity-and-making-resilience-strategic.html
-
Studie: Wirtschaft braucht mehr Schulung in Sachen Hackerabwehr
»Kaum ein Drittel der Unternehmen führt mindestens einmal im Jahr eine Schulung zum Cyber Resilience Act durch.« Die deutsche Wirtschaft sollte in diesem Jahr einen stärkeren Fokus auf das Cybersicherheits-Training ihrer Belegschaften legen. Zu diesem Schluss kommt der aktuelle »IoT & OT Cybersecurity Report 2025« des Düsseldorfer Cybersicherheitsunternehmens ONEKEY [1]. Ab Herbst dieses Jahres… First…
-
Confidential Supply Chains: Wie Unternehmen ihre Softwarelieferkette strategisch absichern
In den letzten Jahren haben Supply-Chain-Angriffe zeitweise ganze Branchen lahmgelegt oder massenhaften Datendiebstahl ermöglicht. Vor dem Hintergrund des EU-Cyber-Resilience-Acts wird von Softwareherstellern daher künftig nicht nur Transparenz, sondern auch nachweisbare Integrität ihrer Komponenten verlangt. Kryptografisch gesicherte Pipelines und Confidential Computing ermöglichen hier eine belastbare, auditfähige Lieferkette. Aber wie sieht eine solche »Confidential Supply Chain« in……
-
Palo Alto Networks patches firewalls after discovery of a new denialservice flaw
Availability disruption: According to Flashpoint, a DoS state wouldn’t expose enterprises to a wider security threat. “Modern enterprise firewalls are designed to ‘fail closed’ rather than ‘fail open’. Entering maintenance mode due to a DoS condition is therefore more accurately characterized as a potential availability disruption than a direct security exposure,” said the spokesperson. “The…
-
Armis startet neues Partnerprogramm zur Stärkung der globalen Cyber-Resilienz
Das Armis Select Partner Program löst sich von starren Stufenmodellen und komplexen Anforderungen und eröffnet Partnern drei klar definierte Wege für den gemeinsamen Marktzugang mit Armis First seen on infopoint-security.de Jump to article: www.infopoint-security.de/armis-startet-neues-partnerprogramm-zur-staerkung-der-globalen-cyber-resilienz/a43372/
-
Data-Resilience 2026 die Scorecard, die IT-Führungskräfte kennen sollten
Welchen Herausforderungen und Risiken waren die digitalen Infrastrukturen im Jahr 2025 ausgesetzt, und welche zentralen Anforderungen für eine widerstandsfähige Datenarchitektur leiten sich daraus im Jahr 2026 ab? Insbesondere KI-Bereitschaft, Unveränderbarkeit, Souveränität und Cloud-Resilienz stehen im Fokus. Eine Scorecard signalisiert mit grünen Signalen eine zukunftssichere Datenbasis und rote Warnsignale zeigen auf verborgene Risiken wie Vendor-Lock-in, ungetestete……
-
DORA penetration testing and threat-led exercises explained
The Digital Operational Resilience Act (DORA) introduces a unified framework for managing ICT risk across the European financial sector, with key requirements, including penetration testing, coming into force in 2026. Its aim is to ensure that regulated organisations, and the critical third-party providers they rely on, can withstand, respond to and recover from operational disruptions.”¦…
-
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Tags: ai, attack, automation, business, ceo, ciso, control, country, cryptography, cyber, cybercrime, cybersecurity, data, detection, exploit, finance, framework, fraud, governance, healthcare, incident, infrastructure, international, middle-east, phishing, ransomware, resilience, risk, service, skills, software, strategy, supply-chain, technology, threat, tool, vulnerabilityAI is anticipated to be the most significant driver of change in cybersecurity in 2026, according to 94% of survey respondents;87% of respondents said AI-related vulnerabilities had increased in the past year. Other cyber risks that had increased were (in order) cyber-enabled fraud and phishing, supply chain disruption, and exploitation of software vulnerabilities;confidence in national cyber…
-
For application security: SCA, SAST, DAST and MAST. What next?
Tags: advisory, ai, application-security, automation, best-practice, business, cisa, cisco, cloud, compliance, container, control, cve, data, exploit, flaw, framework, gartner, government, guide, ibm, incident response, infrastructure, injection, kubernetes, least-privilege, ml, mobile, network, nist, resilience, risk, sbom, service, software, sql, supply-chain, threat, tool, training, update, vulnerability, waf<img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?quality=50&strip=all&w=1024" alt="Chart: Posture, provenance and proof." class="wp-image-4115680" srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?quality=50&strip=all 1430w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=300%2C168&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=768%2C431&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=1024%2C575&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=1240%2C697&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=150%2C84&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=854%2C480&quality=50&strip=all 854w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=640%2C360&quality=50&strip=all 640w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”575″ sizes=”auto, (max-width: 1024px) 100vw, 1024px” /> Sunil GentyalaOver the past year the community has admitted the obvious: the battleground is the software supply chain and…
-
Parliament Asks Security Pros to Shape Cyber Security and Resilience Bill
Lawmakers want the security industry to help them scrutinize the Cyber Security and Resilience Bill First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/parliament-security-pros-cyber/
-
Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
In this Help Net Security interview, Liad Shnell, CISO and CTO at Rakuten Viber, discusses how messaging platforms have become critical infrastructure during crises and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/13/liad-shnell-rakuten-viber-messaging-cybersecurity-risks/
-
Shai-Hulud & Co.: Die Supply Chain als Achillesferse
Tags: access, ai, application-security, backdoor, ciso, cloud, cyber, cyberattack, data, github, Hardware, infrastructure, kritis, kubernetes, LLM, monitoring, network, nis-2, programming, resilience, risk, rust, sbom, software, spyware, strategy, supply-chain, tool, vulnerabilityEgal, ob React2Shell, Shai-Hulud oder XZ Utils: Die Sicherheit der Software-Supply-Chain wird durch zahlreiche Risiken gefährdet.Heutige Anwendungen basieren auf zahlreichen Komponenten, von denen jede zusammen mit den Entwicklungsumgebungen selbst eine Angriffsfläche darstellt. Unabhängig davon, ob Unternehmen Code intern entwickeln oder sich auf Drittanbieter verlassen, sollten CISOs, Sicherheitsexperten und Entwickler der Software-Supply-Chain besondere Aufmerksamkeit schenken.Zu den…
-
Downtime pushes resilience planning into security operations
CISOs describe a shift in how they define success. New research from Absolute Security shows broad agreement that resilience outweighs security goals centered on prevention … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/12/absolute-ciso-resilience-planning/
-
18. Security Forum der TH Brandenburg: Unternehmenssicherheit, Compliance und Resilienz im Fokus
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/18-security-forum-th-brandenburg-unternehmenssicherheit-compliance-resilienz-fokus
-
London council cyber attack exposes personal data and highlights risks of shared public-sector IT
A cyber attack on shared IT systems used by several London councils has resulted in the theft of personal data relating to thousands of residents, raising renewed concerns about the resilience of local government cyber security and the risks posed by interconnected public-sector infrastructure. Kensington and Chelsea Council confirmed that sensitive personal information was accessed…
-
Campaigners urge UK to develop digital sovereignty strategy
UK digital rights campaigners have urged UK parliamentarians to implement a digital sovereignty strategy as part of the forthcoming Cybersecurity and Resilience Bill to reduce reliance on technology subject to foreign interference First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637125/Campaigners-urge-UK-to-develop-digital-sovereignty-strategy
-
TÜV-Verband zum Stromausfall in Berlin: Deutschlands Infrastruktur braucht mehr Resilienz
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/tuev-verband-stromausfall-berlin-deutschland-infrastruktur-bedarf-resilienz
-
Britain Debuts Early Revamp of Government Cyber Action Plan
Experts Salute Urgency and Direction of Travel, Question Funding and Enforcement. The British government has unveiled a new plan for improving cybersecurity protections and resilience capabilities across its IT estate. While lauding the move toward increased accountability, some see a lack of the required funding or enforcement needed to make the plan a reality. First…
-
The Myth of Linux Invincibility: Why Automated Patch Management is Key to Securing the Open Source Enterprise
Users and developers have hailed Linux as the operating system that >>just works,<< celebrating it for decades as a symbol of open source strength, speed, and security. Linux's architecture and permissions model have long helped maintain cybersecurity resilience, fostering a reputation for near-invincible security. However, without additional layers of security to protect enterprise environments beyond..…
-
NIS2-Umsetzung: Neues BSI-Portal geht an den Start
Tags: bsi, ceo, cloud, cyber, gartner, infrastructure, linkedin, nis-2, resilience, risk-analysis, risk-management, service, vulnerabilityUnternehmen können sich ab sofort über das neue BSI-Portal als NIS2-Einrichtung registrieren und IT-Sicherheitsvorfälle melden.Seit Anfang Dezember gilt die EU-Sicherheitsrichtline NIS2 auch in Deutschland. Rund 29.500 Unternehmen sind dadurch verpflichtet, sich als NIS-2-Einrichtungen zu registrieren und dem Bundesamt für Sicherheit in der Informationstechnik (BSI) erhebliche Sicherheitsvorfälle zu melden. Vor diesem Hintergrund hat das BSI ein…

