News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Privileged Access Management (PAM) is moving to the cloud
Privileged Access Management (PAM) is moving to the cloud

A leading provider of zero-trust and zero-knowledge solutions for protecting credentials, privileged access and remote connections, releases the results of the Keeper Security Insight Report “Cloud-based Privileged Access Management (PAM)”. The report examines what IT and security leaders want from a PAM solution and the benefits of moving away from on-premise installations. 82 percent of respondents said they would be better off moving their PAM solution from on-premises to the cloud. Only 36 percent of IT leaders said an on-premise PAM solution makes sense given the current economic climate. PAM is essential…

Read more

Trends: Cybersecurity and Cloud Native Technology for 2024
Trends: Cybersecurity and Cloud Native Technology for 2024

What are the five most important cybersecurity and cloud native technology trends for 2024? Rise of 1000x developers and hackers, AI poisoning attacks and certificate-related failures will pose challenges for the security industry. Venafi, the maker of machine identity management, today released its 2024 cybersecurity and cloud native landscape predictions. AI poses new threats and exacerbates existing risks, the lifespan of machine identities decreases, and the authenticity of codes is subject to stricter scrutiny. As a result, the coming year will be challenging for the security industry. “In 2023, companies will have a wave of…

Read more

Industrial CyberSecurity with XDR functions
Industrial CyberSecurity with XDR functions - Image by Sarah Sever on Pixabay

Kaspersky has expanded its Kaspersky Industrial CyberSecurity solution to include automated, centralized compliance audit capabilities. In addition, the platform now has expanded Extended Detection and Response (XDR) and Network Traffic Analysis (NTA) capabilities, as well as a new user interface for easier management. According to Kaspersky ICS CERT, malicious objects were blocked on 2023 percent of computers with an Industrial Control System (ICS) in Germany in the first half of 16. To address the increase and complexity of cyber threats targeting industrial computers, Kaspersky Industrial Security now offers additional features...

Read more

Cloud: Detect threats in real time thanks to AI
Cloud: Detect threats in real time thanks to AI

New AI-based security solution increases the cyber resilience of cloud architectures. It protects against new threats and misconfigurations in real time and strengthens compliance. A global leader in AI for cybersecurity, has introduced the new Darktrace/Cloud solution, based on its unique self-learning AI. It provides comprehensive visibility into cloud architectures, real-time cloud-native threat detection and response, and prioritized recommendations and actions. This helps security teams manage misconfigurations and strengthen compliance. Combined with insights from Darktrace network, email and endpoint solutions, Darktrace/Cloud enables deeper, contextual understanding...

Read more

Security cloud with AI against cyber attacks
AI against cyberattacks

The new AI companion for the Security Cloud category is intended to simplify and automate cyberattack response and recovery. Included is Microsoft's Azure OpenAI in combination with its data threat engine based on machine learning. Artificial intelligence (AI) can help IT and security professionals better respond to cyber incidents. That's why Rubrik, the zero trust data security company, announces the generative AI companion Rubrik Ruby. This is available in the Security Cloud section and is intended to accelerate cyber detection, recovery and resilience. AI: Azure OpenAI and Data Threat Engine…

Read more

MDR services including penetration testing and red teaming
MDR services including penetration testing and red teaming

Bitdefender today introduced its new Bitdefender Offensive Services. The new offering is aimed at identifying, proactively assessing and resolving security gaps in a company's IT through penetration testing and simulated red team attacks. The offering addresses both on-premises, cloud and hybrid cloud environments. Bitdefender Offensive Services complement Bitdefender's Managed Detection and Response (MDR) portfolio, providing organizations with proactive services and means to strengthen their IT environments, reduce risk while meeting regulatory or compliance requirements such as SOC 2 , HIPAA, GLBA, FISMA, PCI-DSS, NIS2 and ISO 27001 - and all this with...

Read more

Secure SME access points through firewall functions

The provider Zyxel is expanding its Connect & Protect security solution for more protection for WLAN connections through secure access points for SMEs. New firewall functions ensure improved protection of access points. Zyxel Networks is expanding its 'Connect and Protect' (CNP) security solution with new firewall functions so that WLAN connections are protected directly through the access point. The updated Connect and Protect Plus (CNP+) version protects corporate and consumer Wi-Fi networks connected directly to a wireless access point from known and advanced cybersecurity threats using IP review and DNS filtering. At the same time, the transparency of all applications and the possibility of bandwidth throttling are guaranteed….

Read more

AMTD: Pioneering modern IT security
AMTD: Pioneering modern IT security

Automated Moving Target Defense (AMTD) improves application security at Sophos Endpoint by creating threat-agnostic barriers for every process. It becomes more difficult for software to execute code that is not an original part of the application. This particularly prevents malware from executing. As cyber threats intensify, security teams are dealing with an increasing number of alerts and false positives. This affects security efficiency and ties up a lot of resources. Automated Moving Target Defense (AMTD), a new concept developed and promoted by Gartner, aims to break this dynamic and provide relief. Security products…

Read more

AI-based security assistant
AI-based security assistant

A data-centric cybersecurity specialist, expands its AI and machine learning capabilities with the launch of Athena AI, a new generative AI layer spanning the entire Varonis Data Security Platform. Athena AI fundamentally improves the way security teams protect data, from visibility to action execution. Using natural language makes in-depth research and analysis much easier and more efficient. In this way, users of all skill and competence levels become security specialists. Generative AI SOC analyzes: Athena AI’s insights and measures help...

Read more

Secure data in production
Secure data in production

IT and OT are merging more and more, with the effect that production environments can also be directly affected by cyber attacks. A particularly drastic example occurred last year when hackers paralyzed Toyota's entire production facility. Nils Gerhardt, Chief Technology Officer, from Utimaco shows five principles that companies should observe in order to secure their production in the best possible way. Encrypt sensitive data Software-based data and folder encryption ensures that, if in doubt, criminals cannot do anything with stolen data. This means that trade secrets are protected even if a company falls victim to a hacker attack. Effective…

Read more