News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

XDR Innovation: Respond faster to advanced threats 
XDR Innovation: Respond faster to advanced threats

Cisco Extended Detection and Response (XDR) aims to accelerate and simplify security processes in cross-manufacturer, hybrid environments. Evidence-based automation prioritizes and remediates security incidents. Cisco XDR is a complete in-house development and will be generally available in July 2023. The solution simplifies incident investigation across the IT ecosystem and enables Security Operations Centers (SOCs) to immediately mitigate threats. The cloud-first solution uses AI-supported, analytical methods to accelerate the evaluation of incidents and responses to them. So the focus shifts from intricate investigations of everything going on to fixing the incidents…

Read more

New AI/ML powered threat protection platform
New AI/ML powered threat protection platform

Proofpoint is bringing a number of new capabilities to its Aegis Threat Protection, Identity Threat Defense, and Sigma Information Protection platforms. These enable organizations to stop malicious email attacks, detect and prevent identity-based threats, and protect sensitive data from theft, loss, and insider threats. The new innovations from Proofpoint also complement the range of the newly founded Identity Threat Defense (formerly Illusive) business unit, in order to flexibly complement and protect productivity solutions such as Microsoft 365 in particular. Aegis Threat Protection Platform The Proofpoint Aegis Threat Protection Platform is an AI/ML-powered threat protection platform that combines modern...

Read more

Microsoft can open encrypted ZIP files
Microsoft can open encrypted ZIP files

Security researchers have found that Microsoft is probably able to open and scan encrypted ZIP archives stored on Onedrive or Sharepoint - as long as they were created using Windows. There is no official information from Microsoft on the subject. It is a popular tool for cyber attacks via email: the attackers attach an encrypted ZIP file and security programs cannot scan the ZIP file. However, this does not seem to be the case for files created and encrypted under Windows. Accidental discovery: ZIPs are decrypted Some security researchers have accidentally discovered that…

Read more

Economic weakness reduces cyber defences
Economic weakness reduces cyber defences

A survey of 100 US cyber security experts by HackerOne showed: After budget cuts and layoffs in IT security, there are more unpatched vulnerabilities. This potentially makes organizations more vulnerable to attacks. HackerOne, provider of attack resistance management and bug bounty programs, has conducted a survey looking at the impact of budget cuts on corporate cybersecurity. The results underscore the importance of highly integrated solutions to optimize cybersecurity resources and ensure defense against attacks. Bad economy - fewer security employees In the last twelve months, 39 percent of companies have increased the number of their...

Read more

Security as a service
Security as a service

Companies around the world are increasingly using Security-as-a-Service (SECaaS) solutions, Zero Trust and AI. For 42 percent of respondents, “threat defense speed” is the main reason for using SECaaS, i.e. cloud models for outsourcing cybersecurity services. 18 percent say SECaaS helps them address an in-house talent shortage. "In an economy increasingly driven by apps and APIs, cybersecurity processes must operate at lightning speed to stay ahead of rapidly evolving attacks," said Lori MacVittie, F5 distinguished engineer and co-author of the SOAS report. Zero Trust and AI Speed ​​is also a…

Read more

Data breaches in the cloud
Data breaches in the cloud

A report shows rise in ransomware attacks and human error as the leading cause of data breaches in the cloud. 48% of IT professionals reported an increase in ransomware attacks, with 22% of organizations having experienced a ransomware attack in the last 12 months. 51% of organizations have no official ransomware plan Of those who have recently experienced a data breach in the cloud, 55% of respondents cited human error as the root cause. Key Findings Thales announces the release of the Thales Data Threat Report 2023, its annual report on…

Read more

XDR solution for (I)IoT and OT endpoints
XDR solution for (I)IoT and OT endpoints

CrowdStrike is the first security vendor to offer prevention, detection and response capabilities for IoT and OT endpoints. The XDR-IoT solution aims to provide comprehensive protection for Internet of Things assets. CrowdStrike introduces CrowdStrike Falcon® Insight for IoT, the world's first EDR/XDR solution for Extended Internet of Things (XIoT) assets. Delivered via the CrowdStrike Falcon platform, the new offering enables enterprises to apply CrowdStrike's renowned protection, detection and response capabilities to IoT, OT, medical devices, Industrial IoT and other connected devices. This means that customers can now run their business with one and the same platform for XIoT,...

Read more

MXDR: With AI and expert knowledge against hackers
MXDR: With AI and expert knowledge against hackers

AI-based risk analysis and human expert knowledge: Ontinue presents its Managed Extended Detection and Response (MXDR) and explains which three typical problems companies can solve by working with a security partner. Endpoint detection and response was yesterday. Today, companies show their attackers the MXDR rake and work closely with specialized service providers to do this. They use their know-how to implement an expanded security concept that is based on the teamwork of everyone involved and AI-based monitoring of all entry points. A security concept for all entry points The external experts are expanding the proven automated detection of and reaction to…

Read more

Test: Can you rely on endpoint security?
Test: Can you rely on endpoint security?

Since the mass ransomware campaigns by APT groups and the collateral damage caused by the Ukraine-Russia conflict, cyber defense at the endpoint has been the hot topic. The AV-TEST laboratory has tested 17 endpoint security solutions for Windows and shows whether the company solutions can also be relied on. In its series of tests on protection solutions for companies, the AV-TEST laboratory tested 17 endpoint solutions on Windows 10. Many manufacturers can score with strong results and even earn the additional TOP PRODUCT award. Strong results in the test lab For a comprehensive evaluation of the protection quality of an endpoint solution, the lab checks every…

Read more