By Sebastian Spicker, Managing Director DACH at IFS Many companies have invested heavily in digitalisation in recent years. While new platforms and AI solutions promise enormous potential in terms of productivity, efficiency and flexibility, quite a few companies are...
Introduction of Verification of Payee (VoP): An important step, but not a magic solution to fraud
A commentary by Dirk Mayer, Head of Anti-Fraud Consultants at RISK IDENT The introduction of Verification of Payee (VoP) as part of the EU Instant Payments Regulation is a welcome and long-overdue step towards greater payment security in the SEPA area. Comparing the...
Shai-Hulud and the new vulnerability of supply chains: Why cybersecurity must extend beyond your own IT
by Peter Machat, Senior Director EMEA Central at Armis Supply chains: Why cybersecurity must extend beyond your own IT Recent attacks on software supply chains show how vulnerable and intertwined digital infrastructure has become. The incident involving the Shai-Hulud...
The domino effect: Why the Jaguar Land Rover attack exposes the failure of isolated cybersecurity
A commentary by Gerald Eid, Regional Managing Director EMEA at Getronics The cyberattack on Jaguar Land Rover is more than just another headline. The estimated damage is nearly £2 billion, with over 5,000 organisations affected. According to the Cyber Monitoring...
AI prompt manipulation opens Pandora’s box
Why the new attack method is forcing companies to rethink their approach to cyber security Artificial intelligence (AI) is currently transforming the digital world of work at a pace that challenges even experienced IT security managers. Systems that were previously...
AWS outages show: Digital value creation remains vulnerable
Retarus CEO urges review of cloud strategies The current global service problems at Amazon Web Services (AWS) have once again shown how vulnerable digital value chains can become when central cloud providers fail. Numerous companies worldwide were affected – and are...
Why changes in networking and security are paving the way for SASE
By Marco Eggerling, Global CISO at Check Point Software Technologies Ltd. Today's workplace is no longer defined by office walls. IT and security teams must therefore rethink their approach to access and protection. This is where SASE (Secure Access Service Edge)...
Digital firewall at the airport: Why cybersecurity is crucial for punctuality and trust
“Recent cyberattacks on European airports have highlighted how vulnerable the digital infrastructure of air traffic is.” With this statement, Peter Machat, Senior Director EMEA Central at Armis, sums up the current situation. In fact, in recent months, a single...
Cybercrime is an everyday occurrence – economic protection must not be
289 billion euros in damages per year – and yet hardly anything is being done about it? The Bitkom study ‘Economic Protection 2025’ shows that cyber attacks are the new normal, but companies and politicians are slow to respond. Ari Albertini, CEO of FTAPI, demands...
Jaguar Land Rover under cyber attack: lessons for a connected industry
The cyber attack on Jaguar Land Rover is much more than a single incident. It highlights the structural vulnerability of modern industrial companies whose IT and OT systems are increasingly converging. Production stoppages, disrupted supply chains and massive cost...



