Tag: resilience
-
CISO Diaries: Thomas Kopeinig-Gatterer on Intelligent Risk, Resilience, and Security at the Speed of Change
Cybersecurity leadership today is less about building walls and more about helping organizations make better decisions under uncertainty. In CISO Diaries, we speak with leading security executives around the world to understand how they navigate that reality: how they structure their days, make judgment calls under pressure, build trust across the business, and think about…The…
-
KI-Resilienz: compacer stellt Unternehmen Checkliste mit 5 Schritten bereit
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/ki-resilienz-compacer-unternehmen-checkliste-5-schritte
-
KI-Resilienz: compacer stellt Unternehmen Checkliste mit 5 Schritten bereit
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/ki-resilienz-compacer-unternehmen-checkliste-5-schritte
-
KI-Resilienz: compacer stellt Unternehmen Checkliste mit 5 Schritten bereit
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/ki-resilienz-compacer-unternehmen-checkliste-5-schritte
-
DORA and operational resilience: Credential management as a financial risk control
Tags: access, authentication, breach, control, credentials, dora, finance, regulation, resilience, riskArticle 9 of DORA makes authentication and access control a legal obligation for EU financial entities. Here is what the regulation requires, and what a breach looks like when those controls are missing. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dora-and-operational-resilience-credential-management-as-a-financial-risk-control/
-
Warum Unternehmen jetzt ein ganzheitliches Exposure Management brauchen Der Allgefahrenansatz der NIS2
Mit der Verabschiedung des NIS2-Umsetzungsgesetzes durch den Bundestag stärkt der Gesetzgeber nicht nur die Resilienz kritischer Sektoren, sondern verankert gleichzeitig den sogenannten Allgefahrenansatz fest im deutschen IT-Sicherheitsrecht. Dieser Ansatz macht unmissverständlich klar: Cybersicherheit darf sich nicht länger auf die Behebung einzelner technischer Schwachstellen beschränken sie muss alle Risiken entlang der Geschäftsprozesse berücksichtigen. First seen on…
-
3 practical ways AI threat detection improves enterprise cyber resilience
Legitimate admin activity and malicious behavior often look similar without contextHybrid environments generate fragmented telemetry that rule sets can’t correlateLean teams don’t have time to manually connect the dots across systemsPlatforms like Adlumin MDR apply behavioral models and automated triage to suppress low”‘value alerts and elevate incidents that actually matter. Fewer alerts, better context, and…
-
3 practical ways AI threat detection improves enterprise cyber resilience
Legitimate admin activity and malicious behavior often look similar without contextHybrid environments generate fragmented telemetry that rule sets can’t correlateLean teams don’t have time to manually connect the dots across systemsPlatforms like Adlumin MDR apply behavioral models and automated triage to suppress low”‘value alerts and elevate incidents that actually matter. Fewer alerts, better context, and…
-
Using AI to manage insider risk amid Middle East conflict
As geopolitical tensions reshape the cyber threat landscape across the region, organisations are turning to artificial intelligence-driven behaviour analytics, investigative automation and monitoring of AI agents to detect insider risk faster and strengthen operational resilience First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642038/Using-AI-to-manage-insider-risk-amid-Middle-East-conflict
-
Supply Chain Resilience for UK SMEs: Practical Steps to Reduce Third-Party Risk
For many UK SMEs, supply chain resilience is not a specialist security project. It is a business continuity issue. If a key supplier cannot deliver, a software provider has an outage, or a partner mishandles data, the impact can show up quickly in customer service, cash flow, and reputation. The good news is that you……
-
Supply Chain Resilience for UK SMEs: Practical Steps to Reduce Third-Party Risk
For many UK SMEs, supply chain resilience is not a specialist security project. It is a business continuity issue. If a key supplier cannot deliver, a software provider has an outage, or a partner mishandles data, the impact can show up quickly in customer service, cash flow, and reputation. The good news is that you……
-
Supply Chain Resilience for UK SMEs: Practical Steps to Reduce Third-Party Risk
For many UK SMEs, supply chain resilience is not a specialist security project. It is a business continuity issue. If a key supplier cannot deliver, a software provider has an outage, or a partner mishandles data, the impact can show up quickly in customer service, cash flow, and reputation. The good news is that you……
-
Vulnerability Management und SBOM-Generierung sind Key beim CRA
Cyber Resilience Act: Effektives Vulnerability Management und automatisierte Erstellung einer Software Bill of Materials werden zentrale Erfolgsfaktoren für die Hersteller vernetzter Produkte. Mit dem Cyber Resilience Act (CRA) hat die Europäische Union erstmals einen verbindlichen Rechtsrahmen für die Cybersicherheit digitaler Produkte geschaffen. Für die Hersteller vernetzter Geräte, Maschinen und Anlagen rückt damit ein Thema… First…
-
Interview: Critical local infrastructure is missing link in UK cyber resilience
Jonathan Lee, director of cyber strategy at Trend AI, argues for more focus on local and municipal cyber resilience First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641946/Interview-Critical-local-infrastructure-is-missing-link-in-cyber-resilience
-
UK Commits £90m for Cybersecurity and Pushes for ‘Resilience Pledge’
UK unveils £90m cybersecurity funding at CYBERUK to boost SME resilience, promote Cyber Essentials and a new Cyber Resilience Pledge, sparking industry debate First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-pledges-90m-for-cybersecurity/
-
The Time Is Now to Prepare for CRA Enforcement
Tags: cyber, cybersecurity, Hardware, international, law, network, resilience, software, supply-chain<div cla When the EU Cyber Resilience Act (CRA) was introduced into law in 2024, it represented one of the most significant regulatory shifts we’ve seen anywhere in the world with implications for how organizations build, ship, and maintain software. It establishes cybersecurity requirements for hardware and software products sold within the European Union or…
-
UK Pledges £90m for Cybersecurity and Pushes for ‘Resilience Pledge’
UK unveils £90m cybersecurity funding at CYBERUK to boost SME resilience, promote Cyber Essentials and a new Cyber Resilience Pledge, sparking industry debate First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-pledges-90m-for-cybersecurity/
-
Wenn Vertrauen nicht reicht: Warum Unternehmen ihre Cyber-Resilienz neu denken müssen
Die Folgen sind konkret spürbar. Cybervorfälle führen nicht nur zu technischen Problemen, sondern treffen Unternehmen im Kern ihres Geschäfts: Kundenbeziehungen leiden First seen on infopoint-security.de Jump to article: www.infopoint-security.de/wenn-vertrauen-nicht-reicht-warum-unternehmen-ihre-cyber-resilienz-neu-denken-muessen/a44702/
-
NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience
The National Cyber Security Centre has shared an update of its resilience-building efforts for the NHS First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ncsc-plan-boost-nhs-cyber/
-
Tempo ist nicht Resilienz – Ohne Benchmark keine sichere Ransomware-Recovery
First seen on security-insider.de Jump to article: www.security-insider.de/ohne-benchmark-keine-sichere-ransomware-recovery-a-e5669e6719dea955c75b429de8a8fe65/
-
ISMG Editors: Adapting to the Looming Mythos AI Onslaught
Also: NY State Regs Test Resilience vs Compliance, OT Security Nears Breaking Point. In this week’s panel, four ISMG editors explore the industry’s response to Anthropic’s Mythos AI breakthrough, whether tighter New York state cybersecurity rules are driving real resilience or simply compliance, and why operational technology security is fast becoming a critical frontline concern.…
-
ISMG Editors: Adapting to the Looming Mythos AI Onslaught
Also: NY State Regs Test Resilience vs Compliance, OT Security Nears Breaking Point. In this week’s panel, four ISMG editors explore the industry’s response to Anthropic’s Mythos AI breakthrough, whether tighter New York state cybersecurity rules are driving real resilience or simply compliance, and why operational technology security is fast becoming a critical frontline concern.…
-
Taten statt Tools: Warum Cyber-Resilienz meist an der Umsetzung scheitert
Die zentrale Frage für Organisationen lautet nicht, welche neuen Tools man noch benötigt, sondern ob man diejenigen beherrscht, die man schon hat. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/taten-statt-tools-warum-cyber-resilienz-meist-an-der-umsetzung-scheitert/a44687/
-
The endless CISO reporting line debate, and what it says about cybersecurity leadership
Tags: access, business, ceo, cio, ciso, cloud, control, corporate, cyber, cybersecurity, firewall, governance, infrastructure, jobs, monitoring, network, resilience, risk, strategy, technology, vulnerabilityThe governance gap behind the debate: The persistence of this debate reflects a broader governance gap.Historically, information security emerged as a technical discipline embedded within IT departments. Early security teams focused primarily on protecting infrastructure: Firewalls, access controls, network monitoring and vulnerability management. In that environment, it was natural for the security function to sit…
-
The deepfake dilemma: From financial fraud to reputational crisis
Tags: ai, authentication, business, ceo, communications, control, cyber, data-breach, deep-fake, exploit, finance, fraud, malicious, phone, resilience, risk, threat, toolDeepfakes as tools for financial fraud: Deepfakes have quickly become a powerful enabler of financial fraud. This is largely because most business communication channels, like video and voice calls, remain unauthenticated. A single convincing audio or video call, seemingly from a trusted executive, can bypass established controls in minutes. Employees in these scenarios often follow…
-
The deepfake dilemma: From financial fraud to reputational crisis
Tags: ai, authentication, business, ceo, communications, control, cyber, data-breach, deep-fake, exploit, finance, fraud, malicious, phone, resilience, risk, threat, toolDeepfakes as tools for financial fraud: Deepfakes have quickly become a powerful enabler of financial fraud. This is largely because most business communication channels, like video and voice calls, remain unauthenticated. A single convincing audio or video call, seemingly from a trusted executive, can bypass established controls in minutes. Employees in these scenarios often follow…
-
The need for a board-level definition of cyber resilience
Tags: awareness, business, cisa, compliance, control, crime, cyber, cybercrime, cybersecurity, detection, finance, framework, governance, law, metric, regulation, resilience, risk, risk-analysis, risk-management, service, supply-chain, technologyWhere the literature converges: Organizational outcomes vs. policy and controls It’s consistently agreed that cyber resilience should be tied to organizational outcomes rather than technical controls and policies. Rather than focusing on metrics such as mean time to detection or number of security controls, organizational cyber resilience needs to evaluate levels of business continuity, preservation…
-
Ransomware-Bedrohungen und KI-Transformation verschieben Fokus von Recovery hin zu Resilienz
Der neue ‘Veeam Data Trust and Resilience Report” von Veeam Software stellt fest, dass 90 Prozent der Sicherheitsverantwortlichen davon überzeugt sind, Daten schnell wiederherstellen zu können. Allerdings schaffen es letztlich nur 28 Prozent, die Daten nach einem Ransomware-Angriff auch tatsächlich vollständig wiederherzustellen. Veeam hat den ‘Data Trust and Resilience Report 2026″ veröffentlicht, der eine wachsende…
-
QA: Your Face Is Now Part of the Threat Landscape, Warns Sarah Armstrong-Smith
Sarah Armstrong-Smith brings rare front-line authority to the cyber resilience conversation, with a career shaped by some of the most defining digital threats of the modern era. From the Millennium Bug through to board-level cyber strategy at Microsoft and the London Stock Exchange Group, her perspective is grounded in real crisis leadership, not theory. That…

