loader image
Multi-Factor-Authentification in Cloud Environments

Multi-Factor-Authentification in Cloud Environments

One of the biggest security threats today comes from compromised credentials and privileged account abuse. Accordingly, securing privileged access to applications, servers and infrastructure is the foundation of an effective security strategy. Source:...
487 Million Phone Numbers leaked via WhatsApp

487 Million Phone Numbers leaked via WhatsApp

According to reports, countless phone numbers of #WhatsApp users are for sale on a hacker forum. Among them are numbers from Germany. Source: heise.de #WhatsApp #Leak #Hack #newnormal #newnormalint...
$1bn missing after FTX Collapse

$1bn missing after FTX Collapse

At least $1 billion (€968m) in client funds is missing from failed #cryptocurrency exchange #FTX after founder Sam Bankman-Fried secretly shifted $10 billion of their money to his trading company, Alameda Research, anonymous sources tell Reuters. One source says the...
Wave of Cybercrime helps IT-Industry

Wave of Cybercrime helps IT-Industry

In a business survey by UK-based specialist insurer Hiscox, more than half of IT firms in #Germany reported increased orders this year to address cybersecurity vulnerabilities at their corporate clients. Nearly 60 percent of managers said their companies are suffering...
How to make Data theft-proof

How to make Data theft-proof

When a company moves its #data and workloads to the #cloud, it opens up significantly more access points through which #hackers can enter. The challenge of protecting these is therefore greater than ever: in the latest “Cloud Security Report”, 76% of...

Pin It on Pinterest