A commentary by Frank Heisel, CEO of RISK IDENT While the Chinese lunar calendar proclaims 2026 to be the ‘Year of the Goat,’ promising attributes such as justice and good nature, security experts paint a very different picture. The current forecast from RISK IDENT is...
European Digital Sovereignty Summit 2025: ‘From debate to delivery’
According to Martin Hager, founder and CEO of communications service provider Retarus, the European Digital Sovereignty Summit 2025 in Berlin has set a central and long-overdue focus: strengthening European digital independence. It is now crucial that political...
When AI writes code – and security falls by the wayside
By Jochen Koehler, Vice President Sales EMEA at Cycode Large language models write code in seconds. What initially sounds like a new level of efficiency also has a downside, however: security is not yet an integral part of AI-based software development. Thanks to...
Flying blind is not a strategy
By Sebastian Spicker, Managing Director DACH at IFS Many companies have invested heavily in digitalisation in recent years. While new platforms and AI solutions promise enormous potential in terms of productivity, efficiency and flexibility, quite a few companies are...
Introduction of Verification of Payee (VoP): An important step, but not a magic solution to fraud
A commentary by Dirk Mayer, Head of Anti-Fraud Consultants at RISK IDENT The introduction of Verification of Payee (VoP) as part of the EU Instant Payments Regulation is a welcome and long-overdue step towards greater payment security in the SEPA area. Comparing the...
Shai-Hulud and the new vulnerability of supply chains: Why cybersecurity must extend beyond your own IT
by Peter Machat, Senior Director EMEA Central at Armis Supply chains: Why cybersecurity must extend beyond your own IT Recent attacks on software supply chains show how vulnerable and intertwined digital infrastructure has become. The incident involving the Shai-Hulud...
The domino effect: Why the Jaguar Land Rover attack exposes the failure of isolated cybersecurity
A commentary by Gerald Eid, Regional Managing Director EMEA at Getronics The cyberattack on Jaguar Land Rover is more than just another headline. The estimated damage is nearly £2 billion, with over 5,000 organisations affected. According to the Cyber Monitoring...
AI prompt manipulation opens Pandora’s box
Why the new attack method is forcing companies to rethink their approach to cyber security Artificial intelligence (AI) is currently transforming the digital world of work at a pace that challenges even experienced IT security managers. Systems that were previously...
AWS outages show: Digital value creation remains vulnerable
Retarus CEO urges review of cloud strategies The current global service problems at Amazon Web Services (AWS) have once again shown how vulnerable digital value chains can become when central cloud providers fail. Numerous companies worldwide were affected – and are...
Why changes in networking and security are paving the way for SASE
By Marco Eggerling, Global CISO at Check Point Software Technologies Ltd. Today's workplace is no longer defined by office walls. IT and security teams must therefore rethink their approach to access and protection. This is where SASE (Secure Access Service Edge)...



