Tag: resilience
-
Ausblick 2026: Agentic AI und KI-basierte Angriffe prägen Cyberresilienz-Strategien
Mit Blick auf das Jahr 2026 werden Innovationen wie Agentic AI und immer mehr KI-basierte Angriffe Cyberresilienz, Governance und Identitätssicherheit in den Mittelpunkt von Sicherheitsstrategien rücken. Wie können Unternehmen das Spannungsfeld zwischen Innovationsdruck, neuen Bedrohungen und Widerstandsfähigkeit meistern? Wiederherstellung und Resilienz: So lässt sich die Herausforderung durch KI-gesteuerte Angriffe bewältigen Künstliche Intelligenz (KI) beschleunigt… First…
-
AI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026?
Tags: access, ai, api, application-security, attack, authentication, automation, business, ciso, cloud, compliance, computer, computing, container, control, crypto, cryptography, cyber, cybersecurity, data, data-breach, defense, detection, encryption, exploit, finance, flaw, framework, governance, government, healthcare, iam, identity, infrastructure, injection, LLM, malicious, metric, monitoring, network, nist, open-source, oracle, regulation, resilience, risk, service, skills, software, strategy, supply-chain, threat, tool, vulnerability, vulnerability-management, waf, zero-day, zero-trustAI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026? madhav Tue, 01/06/2026 – 04:44 If we think 2025 has been fast-paced, it’s going to feel like a warm-up for the changes on the horizon in 2026. Every time this year, Thales experts become cybersecurity oracles and predict where the industry is…
-
6 strategies for building a high-performance cybersecurity team
Tags: advisory, ai, apple, attack, business, ciso, communications, compliance, cyber, cybersecurity, data, defense, intelligence, resilience, risk, service, skills, strategy, technology, threat, tool, training, update, vulnerability2. Be clear on the mission: Sharon Chand, US cyber defense and resilience leader at professional services firm Deloitte, says a characteristic of a high-performing team is alignment on the team’s mission.To do that, though, team members need to know what the mission is and buy into it.”It has to be a very clear mission…
-
6 strategies for building a high-performance cybersecurity team
Tags: advisory, ai, apple, attack, business, ciso, communications, compliance, cyber, cybersecurity, data, defense, intelligence, resilience, risk, service, skills, strategy, technology, threat, tool, training, update, vulnerability2. Be clear on the mission: Sharon Chand, US cyber defense and resilience leader at professional services firm Deloitte, says a characteristic of a high-performing team is alignment on the team’s mission.To do that, though, team members need to know what the mission is and buy into it.”It has to be a very clear mission…
-
UK government to spend £210m on public sector cyber resilience
The UK government unveils a £120m Cyber Action Plan to help reinforce and promote IT security resilience across the country’s public services First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366636896/UK-government-to-spend-210m-on-public-sector-cyber-resilience
-
Why cybersecurity needs to focus more on investigation and less on just detection and response
Tags: access, attack, breach, cyber, cyberattack, cybersecurity, data, defense, detection, exploit, network, resilience, risk, threat, tool, vulnerabilityInvestigation: Where the real insights lie: This is where investigation comes in. Think of investigation as the part where you understand the full story. It’s like detective work: not just looking at the footprints, but figuring out where they came from, who’s leaving them, and why they’re trying to break in in the first place.…
-
How the Organizational Risk Culture Standard can supercharge your cybersecurity culture
Tags: automation, ceo, communications, compliance, control, cyber, cybersecurity, data, detection, email, finance, framework, group, guide, intelligence, law, metric, nist, phishing, ransomware, RedTeam, resilience, risk, tool, updateThe 10 dimensions, translated for cybersecurity: The ORCS framework defines ten dimensions. Treat them as a system. Each one is distinct; together they are complete. Leadership & governance. Leaders set the tone, model the behavior and anchor accountability. If leaders treat cyber as only an IT issue, everyone else will, too. When leaders make risk-informed…
-
2026 Is the Year to Be Breach Ready: Augment Cyber Resilience with Operational Excellence
A very happy New Year 2026 to you. Those of you who are familiar with my work know that I preach breach readiness, cyber resilience, and building practical capabilities to remain “unaffected” by cyberattacks. A lot of what I have written in 2025 came from how great wars were fought. There is still a lot to learn about modern cyber resilience from them….…
-
Cybersecurity muss im Jahr 2026 neu gedacht werden
2026 markiert einen radikalen Wendepunkt in der Cybersecurity: Cyberphysische Systeme werden zur Achillesferse moderner Unternehmen und verlangen von CISOs eine völlig neue Sicherheitsstrategie. Während hybride Cyberkriegsführung zur Dauerbedrohung avanciert, zwingen neue EU-Regulierungen wie NIS2 und der Cyber Resilience Act Unternehmen und Hersteller zu nie dagewesener Verantwortung und Transparenz. Wer jetzt nicht proaktiv handelt, riskiert nicht……
-
Why 47-Day TLS and SSL Certificate Renewal Cycles Alarm CIOs
Visibility Gaps Increase the Risk of Certificate-Driven Outages. Moving to 47-day TLS and SSL certificate renewal cycles by 2029 will turn certificate management into an enterprise risk. Automation and crypto-governance are now board-level imperatives. Enterprises can prepare for continuous renewal cycles without losing resilience, says Sectigo CEO Kevin Weiss. First seen on govinfosecurity.com Jump to…
-
Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats
Cybersecurity experts discuss 2026 predictions, highlighting the rise of AI-driven threats, the shift to resilience over prevention, and the urgent need for advanced security measures to combat evolving risks First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/cybersecurity-predictions-for-2026-navigating-the-future-of-digital-threats
-
Wie KI die Cybersicherheit neu gestaltet
Tags: ai, ciso, cloud, cyber, cyberattack, cybersecurity, cyersecurity, data, encryption, gartner, governance, group, guide, hacker, incident response, infrastructure, microsoft, phishing, resilience, risk, sans, soc, supply-chain, threat, tool, vulnerability-managementKünstliche Intelligenz und insbesondere Generative KI dringt immer tiefer in die Sicherheitsprozesse vor.Generative KI (GenAI) ist zu einem allgegenwärtigen Werkzeug in Unternehmen geworden. Laut einer Umfrage der Boston Consulting Group nutzen 50 Prozent der Unternehmen die Technologie, um Arbeitsabläufe neu zu gestalten. 77 Prozent der Befragten sind überzeugt, dass KI-Agenten in den nächsten drei bis…
-
Critical vulnerability in IBM API Connect could allow authentication bypass
Tags: api, authentication, control, exploit, flaw, governance, ibm, mitigation, monitoring, radius, resilience, service, software, update, vmware, vulnerabilityInterim fixes provided: IBM said that the issue was discovered during internal testing, and it has provided interim fixes for each affected version of the software, with individual update details for VMware, OCP/CP4I, and Kubernetes.The only mitigation suggested for the flaw, according to IBM’s security bulletin, is this: “Customers unable to install the interim fix…
-
Die Reisebranche muss in Resilienz investieren und sie priorisieren
Die Luftfahrt- und die gesamte Reisebranche befinden sich an einem kritischen Wendepunkt, da ältere IT-Systeme Schwierigkeiten haben, den Anforderungen steigender Passagierzahlen und zunehmender Cyberbedrohungen gerecht zu werden. Um Betrieb und Reputation zu schützen, muss der Sektor dringend sichere, skalierbare und cloud-native Infrastrukturen einführen, die betriebliche Resilienz gewährleisten und sensible Daten schützen, so Martin Smillie,… First…
-
Rechenzentren unter Druck – Resilienz für kritische Infrastrukturen wie Energieversorger und Datacenter
Tags: resilienceFirst seen on security-insider.de Jump to article: www.security-insider.de/schutz-rechenzentren-ki-cybersecurity-energiesektor-a-943989e5e6ba90ab7798500e2471d6fc/
-
Automation forces a reset in security strategy
Enterprise security teams are working under the assumption that disruption is constant. A global study by Trellix shows that resilience has moved from a long term goal to a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/29/trellix-hybrid-security-infrastructure-report/
-
Wenn Stillstand zum Risiko wird: Cyber-Resilienz von Unternehmen im Fokus
First seen on t3n.de Jump to article: t3n.de/news/cyber-resilienz-unternehmen-risiko-1720779/
-
We Asked the Experts: 2026 Predictions
Once again, it’s predictions season. We spoke to experts from across the cybersecurity industry about what the future of cyber may look like as we head into 2026. From AI ethics and API governance to the UK’s Cyber Security and Resilience Bill and exponentially increasing threats, there’s set to be a big shake up to…
-
Why outsourced cyber defenses create systemic risks
Tags: access, ai, attack, backdoor, breach, business, ciso, cloud, compliance, corporate, cyber, cybercrime, cybersecurity, data, defense, detection, dora, exploit, finance, framework, GDPR, governance, government, hacker, healthcare, infrastructure, law, malicious, monitoring, moveIT, msp, nis-2, ransomware, regulation, resilience, risk, software, strategy, supply-chain, threat, tool, vulnerability, zero-trustRisk categories of outsourced IT & cybersecurity: When you outsource, responsibility shifts, but accountability never leaves you. The risks fall into clear categories. Operational risks The most basic risk is fragile continuity. In 2017, British Airways outsourced parts of its IT operations. A system outage grounded flights worldwide. The vendor contract delivered savings, but it…
-
Alles zum Cyber Resilience Act Teil 4 – Konformität und Konsequenzen des CRA
First seen on security-insider.de Jump to article: www.security-insider.de/cyber-resilience-act-strafen-konformitaet-a-84327bc2de46587a01525ae3d9164f31/
-
Deep Packet Inspection für mehr Resilienz
Tags: resilienceDeep Packet Inspection (DPI) wird zu einer zentralen Datenquelle für moderne Observability-Strategien und hilft Unternehmen, ihre IT-Systeme widerstandsfähiger und leistungsfähiger zu machen. Wenn Sie das Gefühl haben, Sie erleben die Informationstechnologie-Version des Films »Und täglich grüßt das Murmeltier«, sind Sie vermutlich nicht allein. Die Störungen im IT-Betrieb in diesem Jahr waren zahlreich. Das hat… First…
-
Cybersecurity Budgets are Going Up, Pointing to a Boom
KPMG finds cybersecurity budgets rising sharply as leaders invest in AI-driven defense, resilience, and smarter security operations. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/cybersecurity-budgets-are-going-up-pointing-to-a-boom/
-
The innovative CISO’s bucket list: Human-led transformation at the core
Tags: ai, application-security, breach, business, ciso, cloud, compliance, control, data, defense, GDPR, governance, group, privacy, regulation, resilience, risk, risk-management, threat, toolBuilding a unified, integrated defense: The second major bucket list theme is breaking down the silos that perpetually plague security organizations. Application security (AppSec), cloud security (CloudSec) and governance, risk and compliance (GRC) groups all work from different spreadsheets and tools and often with different objectives. This model is inefficient, expensive and leaves massive gaps…
-
The innovative CISO’s bucket list: Human-led transformation at the core
Tags: ai, application-security, breach, business, ciso, cloud, compliance, control, data, defense, GDPR, governance, group, privacy, regulation, resilience, risk, risk-management, threat, toolBuilding a unified, integrated defense: The second major bucket list theme is breaking down the silos that perpetually plague security organizations. Application security (AppSec), cloud security (CloudSec) and governance, risk and compliance (GRC) groups all work from different spreadsheets and tools and often with different objectives. This model is inefficient, expensive and leaves massive gaps…
-
The innovative CISO’s bucket list: Human-led transformation at the core
Tags: ai, application-security, breach, business, ciso, cloud, compliance, control, data, defense, GDPR, governance, group, privacy, regulation, resilience, risk, risk-management, threat, toolBuilding a unified, integrated defense: The second major bucket list theme is breaking down the silos that perpetually plague security organizations. Application security (AppSec), cloud security (CloudSec) and governance, risk and compliance (GRC) groups all work from different spreadsheets and tools and often with different objectives. This model is inefficient, expensive and leaves massive gaps…
-
The Biggest Cyber Stories of the Year: What 2025 Taught Us
Tags: access, attack, authentication, awareness, banking, breach, business, ciso, cloud, compliance, container, control, cyber, cyberattack, cybersecurity, data, data-breach, email, encryption, endpoint, exploit, government, healthcare, iam, identity, incident, incident response, Internet, law, metric, mfa, monitoring, network, privacy, regulation, resilience, risk, service, software, strategy, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-day, zero-trustThe Biggest Cyber Stories of the Year: What 2025 Taught Us madhav Thu, 12/18/2025 – 10:30 2025 didn’t just test cybersecurity; it redefined it. From supply chains and healthcare networks to manufacturing floors and data centers, the digital world was reminded of a simple truth: everything is connected, and everything is at risk. Data Security…
-
Digitale Souveränität Selbstbestimmt entscheiden, souverän handeln
Tags: resilienceWie Unternehmen durch Standards und Unabhängigkeit ihre Resilienz stärken. First seen on ap-verlag.de Jump to article: ap-verlag.de/digitale-souveraenitaet-selbstbestimmt-entscheiden-souveraen-handeln/101260/

