News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyberattacks: Complications in Patient Care
Cyberattacks lead to complications in patient care

Cyberattacks impacted patient care in two-thirds of healthcare facilities last year. The study surveyed 653 healthcare IT and security experts. It states that the costs per cyber attack have increased by 13 percent compared to the previous year. The USA has been a pioneer of relevant technical innovations for many years and is therefore an indicator for future developments in Germany. Unfortunately, this also applies to the area of ​​cybercrime. In particular, cyber criminals are now also affecting the healthcare system on a large scale. This is the result of a current study by the Ponemom Institute on behalf of…

Read more

Better secure container development
Better secure container development

A cybersecurity solutions provider has expanded its portfolio with a product that protects all phases of container development. With Kaspersky Container Security, the cybersecurity expert is expanding its offering to include a comprehensive security solution for containerized environments. It protects containerized applications at all times - from development to deployment. The solution is ready for use immediately after installation, is cost-effective and can be easily integrated into a company's IT infrastructure. Containerization accelerates development Containerization makes it possible to build and deploy sophisticated applications faster. The main advantage: their autonomy. The container contains everything you need for…

Read more

Risk management app for Microsoft 365
Risk management app for Microsoft 365

The risk management app Cockpit is a ready-made plug & play solution that can be operated via desktop or smartphone. It identifies, analyzes and evaluates risks. Smart IT solutions for automating tasks and processes are also becoming increasingly popular in the Microsoft 365 workplace. A risk management system is part of responsible and entrepreneurial action. It is part of information security and ensures security, continuity and availability. Regardless of the size of the company, companies are required to deal with risks in their business processes. Smart risk management of possible threats With the help of the new Adlon risk management app Cockpit, companies can systematically...

Read more

1 million euros in prize money for 58 zero-day vulnerabilities
Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities.

Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities. The Zero Day Initiative announces the results of the current Pwn2Own competition. At the hacking competition initiated by Trend Micro, which will take place from June 24th to 27th. The event took place in Toronto, Canada on October 58, and participants discovered a total of XNUMX previously unknown zero-day vulnerabilities. Gaps in mobile and IoT consumer products were the focus of the hacking event, Ethical hackers find zero-day vulnerabilities Several teams scored at the annual competition held in Toronto...

Read more

CSaaS: Study on Cyber ​​Security as a Service 
CSaaS: Study on Cyber ​​Security as a Service

Companies are increasingly strengthening themselves with external expertise. The current study shows that 46 percent of companies are already using Cyber ​​Security as a Service (CSaaS), and another 35 percent are in the process of implementing it. The key reason is 24/7 monitoring and therefore more protection for the company. Cybersecurity has become a critical success factor for companies in recent years. The advancing digital transformation, increasing networking of IT infrastructures and the constant professionalization of cybercrime offer attackers good conditions to identify new attack vectors and attack companies. Company…

Read more

Proactive: Investing in IT security as a business strategy
Proactive: Investing in IT security as a business strategy

IT security is not just an investment that ensures the protection of company assets. It also creates significant added value for customers and enables new business models. This is one of the key findings of a study by Trend Micro. Trend Micro, in collaboration with the Brandenburg Institute for Society and Security (BIGS), surveyed 300 IT and IT security executives about, among other things, their investment behavior. Not just a protective shield, but also a catalyst for flourishing business models and customer satisfaction - this is a reality for those companies that are increasingly investing in IT security and proceeding strategically. They report…

Read more

Highest encryption cracked with quantum computers?
Highest encryption cracked with quantum computers?

The currently highest encryption is the RSA-2048 key. The researcher Ed Gerck Ph.D, physicist and mathematician, now claims to have cracked this using a quantum computer. If all of this were true, all companies would have to put the topic of post-quantum cryptography – i.e. quantum-secure encryption – at the top of their to-do list. The news that researcher Ed Gerck claims to have cracked the RSA-2048 key is currently stirring up a lot of dust. He also claims to have achieved this with a commercial mobile phone or Linux desktop. Ultimately, this would mean that many encryptions for access and passwords in the future will be anything but secure...

Read more

Appropriate data security in industry
Appropriate data security in industry

Data security and backups for businesses are easy to ensure in theory, but how does it work in reality? The current case study shows how easily a company can decide on a solution and how particularly easy it is to implement a cloud-supported solution. A case study by Rubrik. Kelvion, a global manufacturer of industrial heat exchangers, has a complex IT infrastructure. This extends across numerous locations and a global sales and production network. Founded in Bochum in 1920, the group grew steadily over the years. The more global it became, the more challenging it became...

Read more

Cyber ​​resilience: Insufficiently prepared despite fear of attacks
Cyber ​​resilience: Insufficiently prepared despite fear of attacks

In a study, managers from the areas of security and IT operations commented on cyber resilience in their company. The majority expect an attack. Commvault has released a new IDC report commissioned by Commvault entitled “The Cyber-Resilient Organization: Maximum Preparedness with Bullet-Proof Recovery Survey.” In this report, IDC surveyed more than 500 security and IT operations executives worldwide to get an up-to-date overview of how organizations perceive modern security threats and how they are strengthening their cyber resilience. The key findings of this report can be summarized in…

Read more

Learn to hack to prevent attacks
Learn to hack to prevent attacks

“Ethical hackers” hack into corporate networks to identify security holes before attackers find them. This can be learned in a course. Cyber ​​specialists are in short supply. Current studies assume a need for more than 100.000 security employees in companies and authorities - in Germany alone (Cybersecurity Workforce Study; (ISC)2 Research). They are urgently needed to build a resilient security structure for the business location. Hacking as a course offering cyber specialists also offers excellent prospects on the job market. One of the more unusual areas of activity in these future professions is “offensive cybersecurity” (OffSec). Here you will find…

Read more