News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

CSaaS: Study on Cyber ​​Security as a Service 
CSaaS: Study on Cyber ​​Security as a Service

Companies are increasingly strengthening themselves with external expertise. The current study shows that 46 percent of companies are already using Cyber ​​Security as a Service (CSaaS), and another 35 percent are in the process of implementing it. The key reason is 24/7 monitoring and therefore more protection for the company. Cybersecurity has become a critical success factor for companies in recent years. The advancing digital transformation, increasing networking of IT infrastructures and the constant professionalization of cybercrime offer attackers good conditions to identify new attack vectors and attack companies. Company…

Read more

Hardware & Software as a Service for OT Security
Hardware & Software as a Service for OT Security

Nozomi Networks has once again evolved the options to acquire industrial and ICS cybersecurity solutions. With OnePass™, the industry's first fully integrated hardware and software-as-a-service model for OT and IoT security, customers can tailor their solution choice to today's needs with the flexibility to adapt to tomorrow's requirements at any time . “Visibility is critical to defending facilities and assets against today's cybersecurity challenges. Security teams can't wait through lengthy investment assessments to gain the insight they need to protect operations," said Sid Snitkin, Advisory Group...

Read more

IT security in medium-sized companies needs helping hands
IT security in medium-sized companies needs helping hands

IT security in medium-sized companies needs helping hands. More protection thanks to external experts from the Security Operation Center - SOC, as cyber attacks are becoming increasingly complex and require security specialists. A comment from Bitdefender. There is no such thing as XNUMX% security in IT. There will always be vulnerabilities such as unpatched software, leaked passwords or shadow IT that resourceful hackers can use to penetrate corporate networks. And as long as the attackers are human, they must be met by competent flesh-and-blood defenders. These experts are available through external MDR (Managed Detection and Response) services and Security Operation Center (SOC)…

Read more