News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Basics of Effective Security Operations (SecOps)
Basics of Effective Security Operations (SecOps)

The ongoing threat of cyber attacks continues to pose major challenges for companies. Many people now rely on external providers when it comes to SecOps. But even then, IT security is not a sure-fire success; it requires certain prerequisites. Ontinue, expert in Managed Extended Detection and Response (MXDR), defines five core principles that are crucial for the success of SecOps. IT security experts summarize all operational activities in their area of ​​expertise under the term SecOps - i.e. security operations. Since the portfolio of tasks is very broad, companies need a Security Operations Center (SOC) to manage their IT infrastructure...

Read more

SASE: Secure Access Service Edge
SASE: Secure Access Service Edge

As corporate networks grow, so do security requirements. It is no longer enough to set up security barriers in the central data center. The solution is called SASE. Instead, organizations must secure all external endpoints in their IT landscape. This includes devices used by employees in the home office, but also workstations in branches or cloud applications. The solution for providing security features where they should be effective - i.e. at the edge - is called SASE (Secure Access Service Edge). SASE combines the functions of a decentralized network with security services from the cloud and is virtually a must…

Read more

Web 3.0 offers new attack surfaces
Web 3.0 offers new attack surfaces

The emergence of Web 3.0 came at a time when the world was changing fundamentally. At a time when people were told to stay at home and limit personal contact, life had to go on. Business had to continue as usual, contracts had to be concluded and money transferred. Web 3.0 became an opportunity for companies to tap into the digital future. Today, everything can and is done digitally, and while the benefits are clear, new risks and challenges have emerged. With the transition…

Read more

SASE solutions to combat staff shortages in IT
SASE solutions to combat staff shortages in IT

The German IT sector suffers from a shortage of personnel and is chronically understaffed. According to Bitkom, there was a shortage of around 137.000 IT specialists in Germany last year - the highest level of a deficit that has persisted for years. On average, an open position remained vacant for over seven months with employers and, due to demographic change, more IT staff are leaving the labor market for retirement than newly trained experts are joining. At a global level, things aren't looking rosy either: According to cybersecurityventures.com, the number of unfilled IT security positions will rise to 2023 million in 3,5. The consequences:…

Read more

When it comes to cyber insurance, the fine print matters
When it comes to cyber insurance, the fine print matters

When it comes to cyber insurance, companies are confronted with rising premiums, lower coverage amounts and stricter IT security requirements. Purchasing affordable and comprehensive cyber insurance is becoming an increasingly time-consuming and resource-consuming task for businesses. The process is increasingly taking six months or longer, as the "2023 State of Cyber ​​Insurance" report from Delinea, the specialist for solutions that seamlessly extend privileged access management, now shows. In addition, insurers are setting ever stricter requirements for the cyber security of companies and are increasing the number of exclusion criteria that make taking out a cyber policy increasingly unattractive for potential customers....

Read more

Strengthen resilience against cyber attacks
Strengthen resilience against cyber attacks

A leading provider of self-healing, intelligent security solutions, has announced the further expansion of its ecosystem of Absolute Application Resilience. Joint customers can now apply Absolute's firmware-embedded persistence technology to improve the resiliency of more than 80 mission-critical security and business applications. Recent additions include NetSfere, ActivTrak Agent, HP TechPulse, Dell SupportAssist, Symantec Management Agent, BUFFERZONE Safe Workspace, Octopus Pro and Syxsense Responder. Robust Security Controls With the alarming increase in cyber security risks and disruptions, there is an urgent need for robust security controls that…

Read more

Passkey management
Passkey management

Keeper now supports desktop and web browser passkey management for easy and secure passwordless use on supported websites. A leading provider of zero-trust, zero-knowledge cyber security solutions protecting passwords, privileged access, data and connections, today announces expanded support for managing passkeys across all desktop browsers and for every customer . With Keeper, passkeys are stored and managed in the Keeper Vault and can be used for easy login to websites and applications across all desktop web browsers and operating systems. Passkeys replace passwords on supported websites and can...

Read more

Insufficient collaboration within the company increases cyber risk
Insufficient collaboration within the company increases cyber risk

Poor internal communication, unclear responsibilities and a heterogeneous tool landscape make cyber risk management in companies more difficult. The requirements for an effective risk management of the external attack surface, which a company offers via IT assets accessible from the Internet, and the real situation in companies diverge widely. This is the conclusion of a thought leadership report prepared by the analyst firm Forrester and commissioned by CyCognito, market leader for External Attack Surface Risk Management (EASM). A total of 304 security and IT decision-makers in the USA, Germany, France, Great Britain and Canada, who are also responsible for risk assessment within the company, were surveyed.

Read more

Better protect corporate networks from malware
Better protect corporate networks from malware

Malware attacks are becoming more sophisticated, and as business processes continue to move to the cloud, organizations need to improve their defenses to protect against them. SentinelOne announces the launch of its Cloud Data Security product line and the general availability of the first two products: Threat Detection for Amazon S3 and Threat Detection for NetApp. These products are designed to help companies using Amazon S3 object storage and NetApp file storage to detect and prevent the spread of malware in their cloud environments and corporate networks. The new offerings are part of the Singularity Cloud product family and complement...

Read more

Encrypt sensitive data securely in the cloud
Encrypt sensitive data securely in the cloud

Thanks to the proxy encryption architecture, sensitive company data can be protected in a compliant and GDPR-compliant manner. eperi® presents its new encryption adapter for ServiceNow. This means that all sensitive and business-critical data for cloud-based workflow and process automation with ServiceNow is compliant and reliably protected with the help of eperi encryption technology. The seamless integration and the technical structure of the eperi REST Protection Proxy used also ensure that the functionality within the ServiceNow system is not impaired. Especially for sensitive data The eperi REST Protection Proxy is a data encryption solution that was specially developed for the protection of sensitive information in REST web services....

Read more