News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Detect hacker attacks earlier
Hacker attack

In companies, it is always important to detect hacker attacks as early as possible. A behavior analysis helps to shorten the "dwell time" of successful attacks. In films, hacks are often portrayed as a kind of digital bank robbery: the hackers break through the protective mechanisms of their target in a dramatic way and then only have a few minutes to steal the coveted data, while IT security tries desperately to stop the attackers. The reality looks very different, because in fact the cyber criminals usually make themselves comfortable in the network and sometimes spend months or years there ...

Read more

USB mass storage device security risk
Office PC USB stick

USB mass storage devices provide a quick, easy way to move and share data when digital transmission is not possible. However, the high risk of theft and loss makes USB mass storage devices a security nightmare for corporate security. The current widespread remote work has exacerbated these problems. The volume of data downloaded by employees to USB mass storage devices has increased by 19 percent since the beginning of the COVID-123 crisis, according to the DG Data Trends Report. This suggests that many employees are using these devices to take large amounts of data home with them. As a result, there are ...

Read more

Cybersecurity in digital due diligence
gdpr security

Good cybersecurity plays an important role in mergers and acquisitions. In the major Marriott data scandal in 2018, security was not given sufficient attention in advance. Mergers & Acquisitions (M & As) offer significant opportunities for companies to achieve rapid growth or gain competitive advantage. These range from the pooling of resources to the diversification of the product and service portfolio, the opening up of new markets to the acquisition of new technologies or specialist knowledge. Every M&A transaction is associated with a complex and detailed due diligence review, i.e. a careful review of the entire company. On…

Read more

2020: record year of data leaks?
Data leaks 2020

According to Bitdefender experts, 2020 is well on the way to becoming the record year of data leaks. Thanks to Corona and a lot of home office, cyber criminals have a much easier game than in previous years. The year is only half over, but 2020 is already preparing to set a new record in terms of data breaches. The year always got off to a difficult start. Corona has largely turned life inside out in all countries of the world - the perfect starting point for all cyber criminals. From health insurances to tech and software companies to social networks ...

Read more

Study: Corona is driving IT security into the cloud
Cloud computing

A new Exabeam study shows: Corona is driving IT security into the cloud. The home office has accelerated the use of cloud-based security tools. Exabeam presented the results of a survey of security practitioners on the introduction and use of cloud-based security tools. This latest survey was carried out as a comparative sample of a study carried out in March 2020. This allows direct conclusions to be drawn about the influence of the corona crisis on the use of cloud-based security tools. Unsurprisingly, there was an increase in the use of the cloud for parts of IT security: At the beginning of the year, 75 percent of those surveyed were already using ...

Read more

Tricked: Face recognition for access controls
face recognition

The corona pandemic has asked companies around the world how they can change the way their offices work in order to ensure safe collaboration even in the age of social distancing. One guideline for this, which is implemented by many companies, is the installation of hands-free access controls at company entrances in order to reduce employee contact with potentially contaminated surfaces. Of course, managing access controls requires powerful tools to authenticate quickly and efficiently. Many companies use edge computing devices for this purpose. Edge computing is a relatively ...

Read more

Trend Micro: React quickly and specifically to cyber attacks
Cyber ​​attack

To be competitive today, companies need to keep pace with the latest technological trends. Without the parallel development of a security infrastructure and a clear process for responding to attacks, however, these technologies could become the fatal vector for cyber threats. In the event of a cyber attack, a strong incident response plan can get a business back up and running with minimal damage. A good playbook is of great help in setting up the incident response process. According to a study carried out by IBM and Ponemon, data theft costs the affected company an average of $ 3,92 million. These cost…

Read more

Bitglass Report: BYOD security measures are often inadequate
Bitglass BYOD Report 2020

Cloud security provider Bitglass has published its BYOD Report 2020, which analyzes the use and security of personal devices (bring your own device, BYOD) in companies. Bitglass surveyed 303 IT professionals about how companies enable the use of personal devices, what their security concerns are with BYOD, and what measures they have taken to protect their data in a work environment that is increasingly dominated by teleworking and flexibility. Security concerns give way to practical benefits With the rise of teleworking, most organizations are also positive about BYOD in the workplace. 69 percent of the companies surveyed said ...

Read more

AV-TEST: Android security apps for companies
Smartphone B2B apps

The AV-TEST laboratory has started a new series of tests for Android security apps for companies. In the first test, AV-TEST uses three test candidates to present the scope and procedure for the future test series. Time and again, protection apps for companies were also occasionally checked in the tests for Android security apps. However, the perfect test environment for examining apps for the private sector is not particularly ideal for protection apps in the corporate sector. AV-TEST has recognized this problem and is therefore separating the tests of Android security apps for private users and companies. The test structure remains relatively the same; ...

Read more