News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

WatchGuard: Cloud platform receives endpoint security functionalities
WatchGuard: Cloud platform receives endpoint security functionalities

WatchGuard expands its cloud platform with additional endpoint security functionalities. Patch management, encryption and other features relevant to end device protection are now integrated in WatchGuard Cloud. WatchGuard Technologies is massively promoting the vision of establishing a central IT security platform. Four more endpoint security service modules have just been integrated into WatchGuard Cloud. Now the functions "WatchGuard Patch Management", "WatchGuard Full Encryption", "WatchGuard Advanced Reporting Tool (ART)" and "WatchGuard Data Control" are also available to users and partners in this way. The IT security specialist thus offers customers and partners central access for far-reaching security solutions, ranging from comprehensive endpoint protection to…

Read more

DDoS attacks increased by 3 percent in Q24
DDoS attacks increased by 3 percent in Q24

Compared to the third quarter of 2020, the total number of distributed denial of service (DDoS) attacks worldwide increased by almost 24 percent, while the total number of smart, targeted attacks grew by 31 percent compared to the same period last year. In addition, the Kaspersky analysis shows that both bots and botnet servers are very active in Germany. Targets included pandemic control resources, government organizations, game developers, and well-known cybersecurity publications. DDoS attacks - many bots and botnet servers in Germany DDoS attacks aim to overwhelm a network server with service requests so that it ...

Read more

LTE enterprise router for mobile working
LTE enterprise router for mobile working

Cradlepoint presents the new E102 series enterprise router for more network security and location-independent work with LTE with centralized device management. Cradlepoint, the world's leading provider of cloud-based LTE and 5G wireless network edge solutions, is launching the E102 series of new enterprise routers for location-independent work. With the wireless edge routers, Cradlepoint aims to offer global companies the services and functions they need to meet the connectivity, security and IT management requirements of mobile working. The wireless edge router E102 at a glance Modem: C7C modem or C7D modem, each with 2 x SMA connections for cellular antennas Ethernet: 5 x GbE RJ45 (LAN / WAN ...

Read more

IoT security: the sore point in the hospital
IoT security: the sore point in the hospital

The attackers are interested in IoT devices in hospitals. Independent of the industry, experts have been warning of corresponding IoT vulnerabilities for years. An analysis by Marc Laliberte, Technical Security Operations Manager at WatchGuard. Since January 2021, the German federal government has provided three billion euros for the digitization of hospitals as part of the Hospital Future Act. A further 1,3 billion come from the federal states. The goal: a comprehensive investment program for modern emergency capacities, digitization and, last but not least, measures to increase IT security. With the last point in particular, the urgency to act is obvious, because clinics are always ...

Read more

F-Secure finds vulnerabilities in over 150 HP multifunction printers
F-Secure finds vulnerabilities in over 150 HP multifunction printers

F-Secure's security experts have found vulnerabilities in over 150 HP multifunction printers. HP is now releasing patches for security vulnerabilities that hackers can exploit to steal information or carry out other attacks on companies. HP Inc. has released patches for vulnerabilities that cybersecurity vendor F-Secure has discovered in over 150 of its multifunction printers (MFP). According to a study published by F-Secure, attackers can use the vulnerabilities to gain control of unprotected printers, steal information and infiltrate networks in such a way that further damage can be done. Vulnerabilities affect 150 HP printer models Two security advisors from ...

Read more

How to prevent or reduce the impact of ransomware attacks
How to prevent or reduce the impact of ransomware attacks

The latest victims, such as Media Markt and Saturn, the medical service provider Medatixx and the US broker Robinhood, show the range of goals of ransomware attackers: Ultimately, every industry and every company is at risk. But: ransomware attacks can be prevented or their effects can be reduced. But even if ransomware acts like an inevitable evil, there are a number of measures that companies can take to prevent an attack and data loss in your business. Michael Scheffler, Country Manager DACH of the data security specialist Varonis Systems, recommends companies to observe and implement the following points in particular: Make the right preparations Sensitize your ...

Read more

Higher standards for IoT security from 2024

80 percent of cyber attacks are directed against wireless devices. The new extended EU RED directive enforces higher standards for IoT security from 2024. The Internet of Things, ie especially all wireless intelligent devices, represents one of the greatest risks in information technology. With new security requirements, the EU Commission is now significantly increasing the pressure Manufacturers, integrators and distributors of IoT devices - to protect companies and consumers. New EU directive ensures more security The new extension to the so-called RED (radio equipment directive 2014/53 / EU) is to come into force across the EU from 2024 and for ...

Read more

Endpoint security vs. ransomware in the advanced threat protection test
Endpoint security vs. ransomware in the advanced threat protection test

All major ransomware attacks follow a certain attack pattern from APT groups. Therefore, AV-TEST attacked 14 endpoint solutions with 10 sophisticated APT scenarios in the laboratory and evaluated the Advanced Threat Protection Test based on the MITER ATT & CK matrix. Protection solutions for companies usually have to recognize, classify and defend against thousands of attackers every day. The AV-TEST laboratory tests this classic protection every two months with the certification tests for company protection software and thus checks the constant security of the products. In the current Advanced Threat Protection test, the laboratory tests 14 endpoint protection platforms (EPP) for their performance against new, ...

Read more

Cloud Exchange for stronger and more effective cloud security
Cloud Exchange for stronger and more effective cloud security

New and improved tools provide critical integrations and information sharing with partners such as CrowdStrike, Mimecast, Rapid7, and PagerDuty. Netskope launches Cloud Exchange for stronger and more effective cloud security. With Cloud Exchange, the SASE specialist Netskope is launching a suite of integration modules that make the existing security infrastructure of customers much more efficient in defending against cloud security threats: Cloud Exchange enables the cloud-based exchange of data and knowledge between security and IT teams and helps them to act faster and more effectively. Stronger and more effective cloud security The security risks in the cloud continue to increase. This trend ...

Read more

Log management: audit security in just four steps

Log management is rarely a solution, but mostly a constant task. This is a major challenge, especially for small and medium-sized companies. The intelligent ProLog solution from ProLog AG enables data protection-compliant log management made in Germany. If you want to protect yourself against cyber attacks, espionage and digital data theft, or if you are a public authority / KRITIS company you need to protect yourself, you cannot avoid secure log management. With ProLog from manufacturer ProLog AG, IT security expert and value-added distributor ProSoft now provides a simple solution for secure log management via certified resellers. On the basis of integrated functions such as ...

Read more