News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Secure Industrial IoT: A challenge for many 
Secure Industrial IoT: A challenge for many - Image by Vilius Kukanauskas on Pixabay

The concept of Industry 4.0 is essentially based on the digitization and networking of a company's production, logistics and administration. The core building blocks are the devices, sensors and machines connected to the company network and the Internet - the Internet of Things (IoT) and the Industrial Internet of Things (IIoT). For years, companies around the world have been working on the most comprehensive implementation of Industry 4.0 possible - including in Germany. According to an IDC survey from the end of last year, almost half of DACH companies want to increase the speed with which they can develop their IoT and IIoT parks this year...

Read more

Cyber ​​risk: Dangerous apps in connected vehicles
Cyber ​​risk: Dangerous apps in connected vehicles Image: Bing - AI

As vehicles increasingly transform into a kind of connected transportation, they are increasingly resembling smartphones on wheels and therefore pose new cybersecurity risks. At the heart of this transformation is the software-defined vehicle (SDV). SDVs rely on software rather than hardware to plan and implement their functions, enabling continuous updates and improvements to the vehicle's in-vehicle systems. This software-centric approach not only enables the best customization and flexibility, but also the integration of apps for navigation and entertainment, as well as advanced driver assistance systems (ADAS) and even...

Read more

A strategy for Mobile Device Management (MDM)
A strategy for Mobile Device Management (MDM)

70% of employees in modern companies now use four or more endpoints every day, as a study by the Enterprise Strategy Group shows. This presents IT administrators with the growing challenge of keeping track of all these endpoints and their functioning. Since IT staff and time are already scarce, a well-thought-out strategy for mobile device management (MDM) and also specialized MDM software are more than ever a must, not only for security reasons, but also from an economic and efficiency perspective. Ensuring security, functionality and data protection is in…

Read more

SIEM solution with more automation
SIEM solution with more automation - Image by Gerd Altmann on Pixabay

With the motto less routine, more automation, Kaspersky has added new functions to its SIEM solution. Faster threat detection, more automation and more flexible data management thanks to the update of Kaspersky Unified Monitoring and Analysis Platform. The updated version of Unified Monitoring and Analysis Platform in Kaspersky's SIEM is intended to offer optimized threat detection and response so that SOC teams in companies can operate more routinely, more automatically and ultimately more productively. Two thirds of companies with cybersecurity incident Last year, 77 percent of companies were affected by at least one cybersecurity incident - 75 percent even had...

Read more

Three quarters of ransomware victims pay ransom
Three quarters of ransomware victims pay ransom

An international survey of 900 IT and security managers shows that 83 percent of companies were the target of ransomware attacks last year, revealing alarming trends in terms of the frequency, severity and consequences of attacks. A provider in the field of identity-based cyber resilience has conducted an international study to get to the bottom of the prevalence, frequency and costs of ransomware attacks caused by ransom payments and collateral damage. For the study, 900 IT and security experts in companies from various industries in Germany, France, Great Britain and the USA were surveyed. The study was conducted by Semperis in the…

Read more

Risks to SaaS data from cyberattacks
Risks for SaaS data

According to Statista, 70 percent of companies with up to 500 employees use SaaS or application software based on cloud computing. Overall, an average of 56 percent of companies worldwide across all industries and company sizes have introduced SaaS applications. The chances of being among the beneficiaries of these cloud services are therefore good. And there is no end in sight to this rapid development. The ranking of cloud providers shows Amazon Web Services (AWS) with a market share of 34 percent, Microsoft with 21 percent, Google Cloud with 10 percent and Salesforce with 3 percent. IDC expects the public cloud market to grow by…

Read more

Narrative attacks: false facts, real consequences

The danger is diffuse and elusive: While companies increasingly have to find their way in the complex landscape of cyber attacks, narrative attacks are also proving to be a particularly insidious form of cybercriminal attack that can put companies in trouble. This is because false facts quickly lead to real consequences. By spreading misinformation or manipulating and dividing the public, these attacks can cause significant damage to a company's reputation and finances. However, with proactive measures, education and the right tools, companies can defend themselves against these attacks and preserve their reputation and credibility....

Read more

Secure digital identity ensures digital trust
Secure digital identity ensures digital trust Image: Image by Paul Mahon on Pixabay

Through a decentralized public key infrastructure (PKI), companies use different procedures. There is no central tracking of certifications. The result: many companies today do not know how many certificates are in circulation in their ecosystem, who controls them and when they need to be renewed. In order to successfully implement digital business models, companies must ensure that their employees, partners, suppliers and customers have the greatest possible digital trust in their digital ecosystems - their infrastructures and all the digital identities operating on them. This is based, to a large extent, on...

Read more

TotalAI Platform: Vulnerability Assessment of AI Workloads
TotalAI Platform: Vulnerability Assessment of AI Workloads Image: Bing - AI

The new TotalAI solution enables holistic detection and vulnerability assessment of AI workloads to detect data leaks, injection issues and model theft. The platform protects against security and compliance issues by leveraging generative AI and LLM. With TotalAI, Qualys is expanding its portfolio, which is aimed at the growing challenges and risks associated with securing generative AI and large language model (LLM) applications. AI workloads: Securing for the enterprise As companies increasingly integrate AI and LLM into their products and solutions, they are faced with an expanded attack surface and increased cyber risks. Traditional cybersecurity practices are proving inadequate,...

Read more

Microsoft 365 Backup Storage optimizes data security
Microsoft 365 Backup Storage optimizes data security

Another cybersecurity provider is integrating Microsoft 365 Backup Storage into its cloud platform. This enables cost-effective monitoring and management of backups and the recovery of data after a cyberattack. Commvault, a leading provider of cyber resilience and data protection solutions for hybrid cloud companies, has announced Microsoft 365 Backup Storage as an integrated component of Commvault Cloud Backup and Recovery for Microsoft 365. The Commvault Cloud platform for data management, backup, recovery and data protection, built on Microsoft Azure, enables joint customers to use Commvault Cloud with premium Microsoft 365 Backup Storage at any time to optimize data backup and data protection. Thanks to the integration...

Read more