News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Zero Trust: Endpoint agents as a VPN replacement
Endpoint agents as a virtual private network replacement - Image by Gerd Altmann on Pixabay

Organizations can now take full advantage of the benefits of a zero trust architecture while dramatically simplifying network design. New endpoint agents for macOS and Windows serve as a complete replacement for traditional virtual private networks. Lookout has announced new Windows and macOS endpoint agents for its Lookout Secure Private Access Zero Trust Network Access (ZTNA) solution, facilitating the complete replacement of overburdened virtual private networks (VPNs) with cloud-based security. Enterprises can now take full advantage of the benefits of a zero trust architecture while dramatically simplifying network design. According to analysts at Gartner, by…

Read more

More security through passwordless authentication
More security through passwordless authentication - Image by Gerd Altmann from Pixabay

Passwords remain a cybersecurity risk. A more secure alternative is passwordless authentication using biometric data or tokens. Almost every online service requires access data consisting of a user name and password. As a result, a long list of combinations accumulates in a very short time - an average person comes up with around 100 different passwords, as a current study shows. In order not to lose track here, many use one and the same password for several accounts. This is particularly fatal if it is also a…

Read more

Zero trust, especially with patient data
Zero trust when it comes to patient data

Wherever data needs to be protected, the Zero Trust principle is an indispensable security approach - especially in the healthcare sector. Cyber ​​attacks are increasing rapidly there. As healthcare organizations continue to go digital, one thing has become clear: the well-being of patients cannot come first if the digital systems that support them are compromised. According to the Journal of the American Medical Association (JAMA), the frequency of cyberattacks on hospitals and healthcare systems will more than double between 2016 and 2021. Research by Check Point Software Technologies confirms this trend and shows that…

Read more

Effortless authentication with passkeys
Effortless authentication with passkeys

Browser extension and desktop app support storing and managing passkeys. This allows users to log into websites more securely than ever before. Passkeys are also phishing resistant and protects teams. Keeper Security announces passkey support for its platform. Passkeys are stored and managed in Keeper and can be used for easy login to websites and applications in all desktop web browsers and operating systems. The passkeys can also be exchanged between teams in companies. Simple and phishing-resistant passkeys Passkeys are easier to use than many traditional authentication methods. In addition, they are…

Read more

Identity and Access Management with Dark Web Monitor 
Identity and Access Management with Dark Web Monitor

Stolen or leaked credentials lead cyber attackers into the corporate network without any hurdles. WatchGuard strengthens its identity and access management with additional functions such as a password manager and a dark web monitor service for improved implementation of zero trust policies. With the recently presented "AuthPoint Total Identity Security" bundle, WatchGuard Technologies is expanding its offering in the area of ​​identity and access management in a targeted manner. The new service package expands the already established multi-factor authentication (MFA) "WatchGuard AuthPoint" with a dark web monitor service and a suitable password manager. Through the coordinated interaction of these functionalities along the risk-based zero trust policies of the WatchGuard Unified Security Platform architecture, managed...

Read more