News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

SSE, SASE or CASB? The Right Security Approach
SSE, SASE or CASB? The Right Security Approach

The pandemic is forcing companies to change their IT workflow and to resort to techniques that they have not yet dealt with much. It is important to understand terms such as SSE, SASE or CASB and to use the techniques correctly. The past 18 months has prompted many companies to adopt public cloud services as lockdowns have lured them into work-from-anywhere cultures. As a result, they have been forced to accelerate the deployment of cloud technologies to enable short-term distributed work while maintaining productivity and business agility. In retrospect, the turn may seem...

Read more

Darknet: supply of stolen data 11 times higher than in 2015
Darknet: supply of stolen data 11 times higher than in 2015

As a Bitglass study shows, the spread of stolen data in the Darknet is 11 times higher than in 2015. “Where's My Data” experiment 2021 shows that the Darknet has become a larger and busier trading center. A new study by cloud security provider Bitglass shows how cybercriminal behavior and the value of stolen data have developed in the darknet. Bitglass carried out the world's first data tracking experiment back in 2015 to better understand how data is viewed and accessed in the darknet. In the face of increasing digitization and a growing number of data protection violations, the Bitglass Threat Research Group ...

Read more

Ransomware on the rise
Ransomware on the rise

The new normal: ransomware on the rise. With the increased teleworking in companies due to the pandemic crisis, cybercrime has further upgraded and increased its ransomware capacities. In order to be able to keep pace with the other side despite changed conditions, companies must expand their IT security approach and strengthen their measures. Working from home as a result of the crisis helped a hitherto weak trend to become widespread in 2020: at the beginning of the pandemic, 75 percent of companies were working from home;

Read more

Remote work: intelligent cybersecurity technologies
Remote work: intelligent cybersecurity technologies

In the course of the digital transformation, the world of work is changing - and the effects are also noticeable for the IT department. Remote work, cloud computing and personal, unmanaged mobile devices bring with them numerous new risk factors that require agile, effective cybersecurity measures. This also changes the way IT professionals work. The effects of digital transformation are making themselves felt in the business world on numerous levels. Typical company processes can also be continued virtually. A product presentation, for example, can be streamed live, the meeting with the department can take place as an online meeting and collaboration can be carried out regardless of time and location via ...

Read more

Cloud environments: new priorities for data protection
Cloud environments: new priorities for data protection

As a result of the pandemic regulations, home office operations seem to be establishing themselves as a permanent organizational pillar in companies. According to the current Remote Work Report from Bitglass, for which 287 IT security managers were surveyed in January 2021, 53 percent of companies plan to permanently move certain job positions to the home office. Apparently, this gives the introduction of cloud technologies a further boost, because a clear majority relies on cloud-based IT ecosystems for home office operations: 71 percent of those surveyed state that their company is switching from on-premises applications and tools to the cloud will. There is above all ...

Read more

Report: BYOD Vulnerabilities Are Pervasive
Report: BYOD Vulnerabilities Are Pervasive

BYOD vulnerabilities remain ubiquitous. Bitglass BYOD Security Report 2021 Reveals: Organizations still lack the visibility and technology to protect unmanaged personal devices from modern threats. The latest BYOD Security Report from cloud security provider Bitglass shows that with the rapidly growing use of unmanaged personal devices in the workplace (BYOD), companies are ill-equipped to deal with security threats such as malware and data theft. In the course of hybrid working models and permanent remote work, more devices are connected to the company network, which increases the surface area for attack. In collaboration with Cybersecurity Insiders, Bitglass has trained security professionals from ...

Read more

Cloud security: user behavior as a risk

An unsuspecting click on the link of a phishing email, browsing a compromised website or the careless handling of SaaS applications: in theory, a thoughtless, frivolous act is enough to open the door to the company's IT infrastructure for malware. Once the system has been compromised, there is a risk of corporate data being lost. In modern IT environments, it is increasingly important to take security precautions for risky user behavior in order to protect company resources and the data located there. Accordingly, sensitizing the workforce to various attack tactics has long been part of IT-Grundschutz. Raising the awareness of the workforce Modern working methods that ...

Read more

Report: Remote workforce security
Report: Remote workforce security

Remote work: Security concerns remain. Bitglass report sees increased use of cloud technologies through permanent home office models. Cloud security provider Bitglass has published this year's Remote Workforce Security Report. In a survey, IT and security professionals provided information about the effects that working from home had on data security in the past year. Home office is establishing itself - despite security concerns In the majority of companies (57 percent) three quarters of employees are still working from home after one year. An overwhelming majority of companies, namely 90 percent, stated that this high proportion of home office work was also due to the higher productivity in ...

Read more

Design principles of IT security
Design principles of IT security

For IT security managers, an abrupt change from office to fully remote operation must feel like moving from a solid walled villa to the Wild West. Traditional limits of on-premises operation and thus also the control that it offers no longer exist. In the home office, users more or less control devices and software themselves. And that is where the difficulties for IT admins begin. The area to be secured increases suddenly. Just one click on a malicious email attachment, surfing a website with malware, an open WiFi network or an unsecured device, ...

Read more

Healthcare Breach Report: 26 million people affected
Bitglass Healthcare Breach Report: More than 26 million people affected last year. U.S. healthcare data breaches up 2020 percent in 55,2.

Bitglass Healthcare Breach Report: More than 26 million people affected last year. U.S. healthcare data breaches up 2020 percent in 55,2. According to Bitglass' latest Healthcare Breach Report, there were 2020 healthcare data breaches in 599, affecting more than 26 million people in total. Every year the cloud security provider analyzes data from the so-called "Wall of Shame" of the US Department of Health and Social Services. This is a database that contains information about data breaches related to protected health information. Hacker attacks are increasing every year Since 2018 ...

Read more