News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

German companies are calling for police protection against cybercrime
German companies are calling for police protection against cybercrime

Digital assets: Corporate decision-makers in Germany lack legal security and police protection in the event of cyber attacks. Kaspersky survey shows: 64,4 percent of decision-makers demand the same police protection for cybercrime as for other crimes. Companies are obliged to protect their data, which is why decision-makers in Germany are calling for more support and police protection against cybercrime. According to a Kaspersky poll, 66,4 percent of corporate decision-makers believe that companies do not receive the same level of police protection or support when it comes to cybersecurity incidents as they do with real-world crimes. Police protection like regulating crimes in the real world ...

Read more

Stop cyber attacks with remote browser isolation
Stop cyber attacks with remote browser isolation

Safe surfing using the zero trust approach for websites, email links and downloads. Ericom Shield blocks cyber attacks via the web browser, protects users from phishing attacks, malware, ransomware and other threats from remote use. Shield allows completely transparent internet usage. Most companies and institutions use different solutions to prevent employees from visiting problematic websites. The only problem is that between 10.000 and 30.000 new websites containing malicious code are identified every day. A single wrong click is enough to put the entire organization at risk: computers encrypted by malware, ransom demands, the loss of customer data ...

Read more

TÜV SÜD: These are the cybersecurity trends for 2022
TÜV SÜD: These are the cybersecurity trends for 2022

Cybercrime-as-a-Service, growing awareness and securing the entire supply chain are among the most important cybersecurity trends in 2022. In addition, the increasing professionalization of cybercriminals in the area of ​​ransomware requires companies to prepare accordingly. "Kaseya, SolarWinds, the Colonial Pipeline: The attacks in 2021 have once again shown how important it is to establish cybersecurity as part of the corporate culture and to implement it across the entire supply chain," explains Sudhir Ethiraj, Global Head of Cybersecurity Office ( CSO) at TÜV SÜD. “In addition, ransomware is now available to everyone as Cybercrime-as-a-Service, including technical support….

Read more

NETSCOUT brings Omnis Cyber ​​Intelligence

NETSCOUT SYSTEMS, a leading provider of cybersecurity, service assurance and business analytics solutions, announced the release of OmnisCyber ​​Intelligence (OCI). OCI is the market-leading, fastest, and most scalable network security software solution built on the industry-leading network monitoring, packet recording and analysis technology. The solution detects and investigates suspicious activity in real time and afterwards, and identifies threats early in the attack lifecycle. This prevents the spread of infections, fends off future attacks and identifies endangered systems. OmnisCyber ​​Intelligence (OCI) With the increasing number ...

Read more

Neurons platform expanded to include network security solutions
Neurons platform expanded to include network security solutions

Ivanti extends Neurons platform with solutions for network security, compliance automation and the management of IT projects. New releases support companies in creating and securing the Everywhere Workplace. Ivanti, provider of the Ivanti Neurons automation platform, which discovers, manages, secures and maintains IT assets from the cloud to the edge, has introduced three new integrated solutions: Ivanti Neurons for Secure Access, Ivanti Neurons for Project Portfolio Management (PPM) and Ivanti Neurons for Governance, Risk, and Compliance (GRC). The products support customers in creating and securing the "Everywhere Workplace": From Secure Access to Zero ...

Read more

WatchGuard expands cloud platform to include WLAN management
WatchGuard expands cloud platform to include WLAN management

On the basis of the WatchGuard Cloud, managed service providers can now offer all function modules of the WatchGuard portfolio "from a single source" including WLAN management and new Wi-Fi 6 access points. After the successful integration of Panda's endpoint security solutions in the middle of the year, WatchGuard Technologies has once again expanded its WatchGuard Cloud security platform: From now on, WatchGuard's WLAN products can also be administered online at the same location. Last but not least, this gives managed service providers the opportunity to offer extensive security services on the basis of a centrally managed platform that integrates all WatchGuard technologies. This includes…

Read more

Simulation training for diplomats and non-technical cyber experts
Simulation training for diplomats and non-technical cyber experts

Technical Attribution in Cyberspace: Kaspersky offers simulation training for diplomats and non-technical cyber experts. An otherwise complicated safety training is conveyed via an online simulation game. With the support of the non-profit educational foundation DiploFoundation, Kaspersky has developed an online simulation game that gives diplomats and cyber professionals without a technical background an understanding of cyber attacks. Kaspersky Interactive Protection Simulation (KIPS): technical attribution aims to provide cyber professionals with knowledge about the complexity of technical attribution. Kaspersky Interactive Protection Simulation (KIPS) In order to be able to guarantee cyber stability, a solid understanding and knowledge of the prevention and assessment as well as the reaction to risks and threats is ...

Read more

LANCOM Advanced VPN Client for macOS Big Sur and Monterey
LANCOM Advanced VPN Client for macOS Big Sur and Monterey

LANCOM Systems is now providing an update for its software VPN client for MacBook Pro, iMac, Mac Pro & Co. The VPN client enables full remote access to a company network via highly secure IPSec VPN and any Internet connection. With the LANCOM Advanced VPN Client, employees can dial into the company network via encrypted access at any time - whether in the home office or on the go, at home or abroad. It is very easy to use: after the VPN access (Virtual Private Network) has been configured once, the secure VPN connection is set up intuitively with just one click. For additional protection ...

Read more

Disaster recovery as a service after a ransomware attack
Disaster recovery as a service after a ransomware attack

Minimize downtime and data loss after ransomware attacks. Cohesity Disaster Recovery as a Service is available immediately with enhanced recovery capabilities from Cohesity SiteContinuity. Just months after releasing its Backup as a Service (BaaS) solution, Cohesity, a leading provider of data management solutions, announced the general availability of Disaster Recovery as a Service (DRaaS). This new offering extends the recovery capabilities of Cohesity SiteContinuity. Amazon Web Services (AWS) as a recovery location In addition, Amazon Web Services (AWS) can be used as a recovery location for failover and failback in a software-as-a-service (SaaS) model. This not only offers customers ...

Read more

Independent Certificate Lifecycle Management provider
Independent Certificate Lifecycle Management Provider Certificates

A product innovation enables companies to manage both public and private certificates issued by Sectigo and other CAs on a single platform. Sectigo is transforming itself into a CA-independent Certificate Lifecycle Management provider. Sectigo, a leading global provider of digital certificates and automated Certificate Lifecycle Management (CLM), announces the further development of its most important product, the Sectigo Certificate Manager (SCM). With immediate effect, this will become a universal platform that is able to manage public and private certificates from other leading certification authorities (CAs). This innovation offers companies a completely ...

Read more