Tag: resilience
-
Absolute Security: Enterprise PCs Are Left Unprotected 76 Days a Year as Endpoint Tools Fail 21% of the Time
Absolute Security released its 2026 Resilience Risk Index at RSA Conference 2026, and the headline finding is stark: endpoint security software fails to protect devices nearly 21 percent of the time, leaving enterprise PCs exposed to attacks for up to 76 days per year. The report is based on anonymized telemetry analyzed across millions of..…
-
Irish government launches CNI resilience plan
Ireland’s National Strategy on the Resilience of Critical Entities sets out a pathway to improved cyber resilience for the nation’s critical infrastructure, and establishes compliance with an EU directive First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640673/Irish-government-launches-CNI-resilience-plan
-
Cyber Resilience Act (EU)
What is the Cyber Resilience Act (EU)? The Cyber Resilience Act (CRA) is a European Union regulation designed to establish mandatory cybersecurity requirements for products with digital elements placed on the EU market. Proposed by the European Commission as part of the EU’s broader cybersecurity strategy, the CRA aims to ensure that hardware and software……
-
Resilienz: Die unterschätzte Ressource im Datenschutzmanagement
Angesichts zunehmender geopolitischer Unsicherheiten, KI”‘gestützter Cyberangriffe und wachsender regulatorischer Anforderungen wird Cyberresilienz zu einer zentralen Voraussetzung wirksamen Datenschutzmanagements. Der Beitrag zeigt, warum rein reaktive Sicherheitsmaßnahmen nicht ausreichen und wie ein mehrschichtiger, systematischer Resilienzansatz den Schutz, die Verfügbarkeit und die Wiederherstellbarkeit von Daten nachhaltig stärkt. Cyberresilienz wird dabei als integraler Bestandteil moderner IT”‘ und Datenschutzarchitekturen verstanden,……
-
Cyber Resilience Act: BSI hat Vorsitz der AdCo CRA
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/cyber-resilience-act-bsi-vorsitz-adco-cra
-
TDL 018 – How To Think, Not What To Think – Mitch Prior
Tags: access, ai, apple, attack, backup, blockchain, business, cctv, china, ciso, cloud, computer, conference, control, credentials, cvss, cyber, cybersecurity, data, defense, detection, exploit, finance, firmware, google, infrastructure, intelligence, Internet, iot, jobs, law, mail, malware, military, network, phone, privacy, resilience, risk, router, software, strategy, switch, technology, threat, tool, vulnerability, wifi, zero-trustThe Human Algorithm in a Zero-Trust World In the latest episode of The Defender’s Log, host David Redekop sits down with cybersecurity expert Mitch Prior to discuss the intersection of high-tech security and human intuition. From their first meeting in 2018″, the early days of Zero Trust”, the duo explores why the “why” behind technical…
-
Einfluss der künstlichen Intelligenz auf die Cloud-Einführung, Budgets und IT-Resilienz
Suse hat seine Studie ‘Cloud and AI Pulse Survey” veröffentlicht. Sie belegt, dass immer mehr Unternehmen aus technischen und betrieblichen Gründen sowie im Hinblick auf die digitale Souveränität auf hybride (59 Prozent) und private (16 Prozent) Clouds umsteigen. Die global angelegte Umfrage unter fast 600 führenden Unternehmen im Technologiesektor in Deutschland, Großbritannien, den USA, Japan…
-
Cybercriminals are Winning with AI
AI has become the most powerful tool for financial fraud since the dawn of the Internet. As predicted, criminals are exploiting it faster, more effectively, and at scale. According to the latest Interpol Global Financial Fraud Report, AI-enhanced fraud is now 4.5 times more profitable than traditional schemes. That’s a significant shift and we’re still…
-
Ditch ‘big transformation’ cyber strategies for continuous improvement
As artificial intelligence reshapes the enterprise, CISOs must abandon risky big bang security transformation initiatives in favour of incremental changes to build cyber resilience First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640480/Gartner-Ditch-big-transformation-cyber-strategies-for-continuous-improvement
-
CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026
Austin, United States, March 19th, 2026, CyberNewswire Cybersecurity has entered a new phase, one defined less by reactive controls and more by continuous, intelligence-driven operations. As attack surfaces expand and adversaries increasingly leverage AI, the modern CISO is tasked with orchestrating resilience at scale. Amid this shift, CISO Whisperer has released its list of “Cybersecurity…
-
The True Cost of Cyber Downtime: A UK Board-Level Briefing
Tags: attack, backup, business, cloud, communications, compliance, control, cyber, cyberattack, data, finance, GDPR, governance, healthcare, infrastructure, insurance, monitoring, resilience, saas, service, supply-chain, technologyWritten by Sean Tilley, Senior Sales Director EMEA at 11:11 Systems Cyber downtime carries measurable financial consequences, and those consequences are becoming clearer with each major incident. Research from 11:11 Systems shows that 78% of European organisations report losses of up to $500,000 per hour following a cyber-related outage, while 6% face costs exceeding £1 million per…
-
Cyber-Resilienz braucht Blick auf die ganze Systemarchitektur – Fünf Schichten für effektive Cyber-Resilienz
First seen on security-insider.de Jump to article: www.security-insider.de/cyber-resilienz-fuenf-schichten-systemarchitektur-a-ac66d343b7dd33833fd6ab3a242347bb/
-
CISOs rethink their data protection strategies
Tags: access, ai, attack, automation, breach, business, cisco, ciso, cloud, compliance, computing, control, cyber, data, defense, framework, governance, healthcare, identity, jobs, LLM, privacy, resilience, risk, service, strategy, technology, tool, zero-trustFactors driving strategy evaluations CISOs, security experts, and data practitioners cite the expanding use of AI in the enterprise as the main reason they’re rethinking their data protection strategies.”AI is exposing more sensitive information as [workers] are taking that information and typing it into LLMs,” says Errol Weiss, CSO at Health-ISAC.AI tools make it easy…
-
Ransomware’s Opening Play: Target Identity First
Ransomware attackers now target identity systems like Active Directory first. Learn how identity resilience can help you prevent and recover from attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/ransomware-resilience/
-
Interview: D360 Bank redefines cyber security for Saudi Arabia’s cashless future
Muath Alhomoud, director of cyber security at D360 Bank, discusses payment security, cloud resilience and the responsible use of AI in a hyper-connected financial ecosystem First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640362/Interview-D360-Bank-redefines-cyber-security-for-Saudi-Arabias-cashless-future
-
Inside Nevada’s Push for Secure Digital Government
Tags: ai, attack, cio, cybersecurity, data-breach, governance, government, identity, ransomware, resilienceState CIO Tim Galluzi on Identity Modernization, AI and Resident Services. The State of Nevada is accelerating its cybersecurity and digital modernization efforts after a major ransomware attack exposed the importance of resilience, workforce readiness and strong governance, said State CIO Tim Galluzi. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/inside-nevadas-push-for-secure-digital-government-a-31037
-
Notfall-Onboarding scheitert ohne die richtige Vorbereitung – DDoS-Resilienz entscheidet sich schon lange vor dem Angriff
First seen on security-insider.de Jump to article: www.security-insider.de/ddos-resilienz-notfall-onboarding-vorbereitung-mitigation-a-4b513bede48cbe6b3cfa9017f8280abd/
-
What it takes to win that CSO role
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, defense, finance, flaw, framework, google, identity, insurance, jobs, monitoring, network, resilience, risk, skills, startup, strategy, technology, threatGovern the explosion of shadow AI and establish guardrails for generative AI before it creates material data leakage.Move beyond prevention and operate as a business enabler, proving the organization can maintain a minimum viable business during a sustained outage.Address compliance burdens, such as SEC disclosure rules or the EU AI Act, not as a checklist,…
-
What it takes to win that CSO role
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, defense, finance, flaw, framework, google, identity, insurance, jobs, monitoring, network, resilience, risk, skills, startup, strategy, technology, threatGovern the explosion of shadow AI and establish guardrails for generative AI before it creates material data leakage.Move beyond prevention and operate as a business enabler, proving the organization can maintain a minimum viable business during a sustained outage.Address compliance burdens, such as SEC disclosure rules or the EU AI Act, not as a checklist,…
-
7 Wahrheiten über digitale Resilienz in der Sales Saison
Tags: resilienceDie Sales Season 2025/26 hat neue Rekorde gebrochen und damit die digitale Belastbarkeit vieler Systeme auf die Probe gestellt. Warum echte Resilienz erst nach dem Höhepunkt beginnt. First seen on it-daily.net Jump to article: www.it-daily.net/it-management/digitalisierung/7-wahrheiten-digitale-resilienz
-
When insider risk is a wellbeing issue, not just a disciplinary one
Tags: access, breach, compliance, control, cyber, data, exploit, finance, group, malicious, monitoring, resilience, risk, risk-management, security-incident, threat, training, vulnerabilityWritten by Katie Barnett, Director of Cyber Security at Toro Solutions Insider risk is still often framed around intent, with the focus placed on malicious employees, disgruntled contractors, or deliberate misuse of access for personal gain.Those cases exist and they matter, but they are rarely where risk first begins, and they do not reflect how…
-
When insider risk is a wellbeing issue, not just a disciplinary one
Tags: access, breach, compliance, control, cyber, data, exploit, finance, group, malicious, monitoring, resilience, risk, risk-management, security-incident, threat, training, vulnerabilityWritten by Katie Barnett, Director of Cyber Security at Toro Solutions Insider risk is still often framed around intent, with the focus placed on malicious employees, disgruntled contractors, or deliberate misuse of access for personal gain.Those cases exist and they matter, but they are rarely where risk first begins, and they do not reflect how…
-
Why Most DDoS Protection Fails: Solving for Continuity and Resilience
Most organisations assume DDoS (Distributed denial of service) protection is a box they’ve already ticked. If traffic spikes or an attack starts, the thinking goes, their provider will absorb it and move on. But in the real world it can be a different story. Many incidents aren’t caused by the scale of an attack alone,……
-
Mikrosegmentierung: Neue Strategie für Prävention, Resilienz und Sicherheit
Mittels automatisierter Mikrosegmentierung können Unternehmen die möglichen Folgen eines Cyberangriffs effizient und effektiv eindämmen. Zero Networks analysierte über einen Zeitraum von zwölf Monaten (Dezember 2024 bis Dezember 2025) etwa 3,4 Billionen Aktivitäten in 400 Unternehmensumgebungen. Ziel war es, zu verstehen, wie sich erfolgreiche Cyberangriffe nach dem ersten Zugriff weiterentwickeln. Das Ergebnis: Die gefährlichsten Aktivitäten… First…
-
How SMBs Can Proactively Strengthen Cybersecurity
Tags: access, attack, best-practice, business, ciso, compliance, control, cyber, cyberattack, cybercrime, cybersecurity, data, identity, infrastructure, resilience, risk, service, tool, updateCyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As cyberattacks are ramping up, specifically against Critical Infrastructure sectors, Small and Medium Businesses (SMBs) are feeling the pressure and asking what they can do to better protect themselves in reasonable ways. Don’t Accept Failure SMBs often feel overwhelmed when…
-
Cyber Resilience Act AI Automated Verification
Ensure EU Cyber Resilience Act compliance without slowing down AI-assisted development. Use SonarQube for automated AI code verification, SAST & SBOM generation. Secure your SDLC today. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/cyber-resilience-act-ai-automated-verification/
-
Cyber Resilience Act AI Automated Verification
Ensure EU Cyber Resilience Act compliance without slowing down AI-assisted development. Use SonarQube for automated AI code verification, SAST & SBOM generation. Secure your SDLC today. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/cyber-resilience-act-ai-automated-verification/

