Majority of company employees cope well in their everyday work IT security is fully effective when it is also supported by the workforce For effective IT security, it is important that company employees are able to work well with the measures and guidelines that have...
Why cyber security is essential today – Salto Systems and secure smart access in the European context
The increasing digitalisation of physical access systems is fundamentally changing the security architecture of companies, public institutions and critical infrastructures. Access control is no longer organised exclusively on a mechanical or local basis, but is now...
Trust seal for data centres in the Middle East
BSI establishes global standard for security, availability and sustainability Data centre boom calls for new trust mechanisms The global expansion of data centres is accelerating rapidly. Artificial intelligence, cloud computing and data-intensive applications are...
Fake dating app serves as spying tool
Current campaign shows how effective social manipulation is Online dating is a popular hunting ground for cybercriminals. Security researchers at ESET have now uncovered a digital romance scam in Pakistan that is completely new in this form. Hackers use a manipulated...
Data Privacy Day 2026: Data protection through AI more relevant than ever
Chris Harris, EMEA Technical Director, Data and Application Security at Thales Most data breaches today are not caused by hackers. They take place quietly within IT systems. Although the findings of the Thales Data Threat Report show that the number of reported data...
The biggest cyber attacks of 2025 and the lessons learned
2025 was a record-breaking year for cyber attacks. From Salesforce leaks to state espionage, 8com highlights the biggest threats and lessons learned in its comprehensive review of the year. The year 2025 marks a turning point in the history of digital security. While...
Flipping the switch: 2026 will see a shift from reaction to prevention
Author: Martin Zugec, Technical Solutions Director, Bitdefender New technologies, new pace: cybercriminals' skills are developing faster than ever. In 2026, companies will therefore undergo a fundamental change: away from reactive defence and towards proactive and...
Data security and cyber resilience put to the test
Author: Greg Hansbuer, Pink Elephant Controversial issues surrounding data sovereignty, cyber security, compliance and resilient data infrastructure will be even more pressing for companies in 2026 Geopolitical tensions and the dominance of international tech...
Massive data leak at Condé Nast: 2.3 million WIRED records published
A hacker has published 2.3 million records containing sensitive information about WIRED subscribers after the publisher Condé Nast ignored his warnings. Further publications involving a total of 40 million records are imminent. As the year draws to a close, the...
Five key IT trends for 2026
Assessment by the Association for the Promotion of IT from Europe (ITE) Global supply bottlenecks, new European regulations and growing demands for digital sovereignty will force companies to make strategic decisions in 2026. According to the Association for the...


