News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Backup for Microsoft 365 – new extension
Improved backup for Microsoft 365

A simple and flexible Backup-as-a-Service (BaaS) solution extends data backup and ransomware recovery functionality for Microsoft 365, reducing downtime in the event of a ransomware attack. Veeam® Software has expanded its partnership with Microsoft. Through Cirrus by Veeam, Veeam is making it easier for customers to protect Microsoft 365. The new BaaS capabilities leverage the power and reliability of the industry-leading Veeam Backup for Microsoft 365 solution, as well as the track record and experience of nearly 18 million secured Microsoft 365 users. Quickly restore critical data Veeam recently announced its new integration with Microsoft 365 Backup Storage at Microsoft…

Read more

Cloud security: This is important in 2024
Cloud security: This is important in 2024

In the past, experts were not aware of drastic events such as the pandemic or wars. An expert in data encryption in the cloud summarizes what will affect companies in 2024 - new trends and more. Some of what applied to 2023 and earlier years also applies to 2024, says Andreas Steffen, CEO of eperi: You should come up with a well-thought-out concept for security, data protection and compliance in order to protect yourself and your customers and to protect the company from sensitive issues to avoid operational disruptions or penalties. The back door is still a crack...

Read more

Tips for implementing the NIS2 directive
Tips for implementing the NIS2 directive

The correct use of cyber security is now more important than ever. Due to increasing threats, the risk of attacks is constantly growing. The legislature also recognized this and created the NIS2 guideline. Axians gives tips on how companies should proceed now. A quarter of a million newly discovered malware variants, 2.000 identified vulnerabilities in software products per month, 21.000 newly infected systems every day, 68 successful ransomware attacks and two attempts per month on municipal facilities or municipal companies alone. Alarming figures are mentioned in the current cyber security situation report from the Federal Office for Information Security (BSI): The office warns that criminals...

Read more

Security Cloud Enterprise Edition as a managed service

“Cyber ​​Resilience as a Service” enables companies of all sizes to obtain Rubrik’s portfolio for more data security from the MSP SVA. Rubrik Security Cloud Enterprise Edition includes features for increasing cyber resilience as well as proactive threat detection and risk mitigation. Rubrik, the Zero Trust Data Security company and the IT service provider SVA System Vertriebs Alexander GmbH are deepening their partnership. As the first Managed Services Provider (MSP) in Germany, SVA now offers customers the Security Cloud (RSC) Enterprise Edition as a managed service. With this offer, the partners help…

Read more

Immutable memory protects against attacks
Immutable memory protects against attacks

A survey of cybersecurity experts from companies with more than 1.000 employees confirms that 46 percent of respondents believe that generative AI increases their company's vulnerability to attacks. This trend appears to be already well underway, with 75 percent of respondents confirming that they are seeing an increase in attacks compared to last year - 85 percent attributing this increase to the use of generative AI by cybercriminals. With generative AI, cyber fraudsters have even more options to adapt flexibly, use complex tactics to circumvent traditional data protection solutions and...

Read more

Global Threats: Data Protection for Local Data

Ransomware attacks, data stealer attacks, exploits for vulnerabilities: Even if the attacks are global, they are aimed at local, partly decentralized data storage. Here it is important to rethink data protection and use other solutions. The Federal Office for Security and Information Technology (BSI) recorded 68 successful ransomware attacks, i.e. an average of more than one success for cyber criminals per week, in 2023. In the IT Security Germany 2023 management report, the BSI reports an average of 2000 new vulnerabilities in software products per year A quarter of a million new malware variants every month and every day. However, alongside the threats,...

Read more

Five cyber defense strategies
Five cyber defense strategies

In the past two years, attackers have managed to penetrate the systems of 78 percent of German companies. This is shown by the “Data Risk Management” study by Veritas Technologies. What's particularly concerning is that AI tools like WormGPT make it easier for attackers to refine their social engineering attacks through AI-generated phishing emails. But that's not all: AI-controlled, autonomous ransomware attacks will continue to occur more frequently in 2024. Below, Veritas explains the effective methods and proven tips for defending against cyberattacks, especially with regard to ransomware. Password hacking Cybercriminals exploit security gaps and get hold of other people's passwords...

Read more

Post-Quantum ready PKI
Post-Quantum ready PKI

An identity, payment and data security provider has announced the general availability of its “post-quantum ready” PKI-as-a-Service (PKIaaS PQ) platform. This means the company's cloud-based PKI-as-a-Service offering can now provide both composite and pure quantum secure CA hierarchies. This in turn enables customers to test or implement quantum-safe scenarios and infrastructures. Entrust's solution is the first commercially available platform of its kind. “While the threat of quantum computing is still several years ahead, the transition to quantum-safe algorithms will mean much more than just another crypto refresh cycle. In preparation, the…

Read more

Recover deleted SaaS data
Recover deleted SaaS data

According to Statista, Microsoft Office 365 controls nearly 50 percent of the global office productivity software market. Surely one or two users of this suite have accidentally permanently deleted an email, but Office 365 has built-in data protection functions that can be used to restore Outlook emails. This includes various email retention policy features that can be individually configured to meet specific legal compliance and operational requirements. In principle, however, the following applies: Exchange Online stores deleted emails for 14 days, up to a maximum of 30 days. Data protection at the highest level Difficult or even...

Read more

Threat from state actors
Threat from state actors

Trend Micro, one of the world's leading providers of cybersecurity solutions, announces the discovery of a security vulnerability in Microsoft Windows Defender. This is actively exploited by the cybercriminal group Water Hydra. Trend discovered this vulnerability on December 31, 2023 and has automatically protected customers from it since January 1, 2024. Organizations are advised to take immediate action to forestall continued exploitation of this vulnerability by cybercriminals. The vulnerability (CVE-2024-21412) is an active zero-day vulnerability that was reported to Microsoft by Trend Micro's Zero Day Initiative (ZDI). Trend Micro gives…

Read more