News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

AI is revolutionizing access management
AI is revolutionizing access management

Many companies are currently considering using artificial intelligence (AI) for identity management. The technology not only allows users to monitor suspicious behavior more effectively and automatically, but also improves security systems. In the study “The State of Identity Governance 2024,” almost 53 percent of the 567 IT experts and executives surveyed said that functions supporting AI in identity and access management, for example, were among the top five priorities when evaluating such a solution. More and more IT administrators are coming to the conclusion that with many traditional IGA (Identity Governance and Administration) systems…

Read more

OpenADR: Strategies for protecting critical infrastructure
B2B Cyber ​​Security ShortNews

Energy supplies are inherently targeted by attackers and sophisticated cyberattacks. The OpenADR Alliance, among others, is driving forward the urgently needed defensive measures and innovative strategies to protect critical infrastructure - and is primarily based on three supporting pillars. Communication within the energy industry is a delicate point. Connections between utility companies and end devices, such as private households or medium-sized companies, offer a large area of ​​attack. Because attacks on critical infrastructure have devastating consequences for energy supplies and the civilian population, the OpenADR communications standard is breaking new ground in terms of security...

Read more

Cyber ​​attacks cost over 5 million euros annually
Cyber ​​attacks cost over 5 million euros annually

Cyber ​​attacks are increasing. Last year, 71 percent of German companies fell victim to ransomware. 59 percent paid ransoms. 53 percent fear more hacker attacks through generative AI technologies. Barracuda Networks has released its Cybernomics 101 Report, which analyzes the financial impact and profit motives behind cyberattacks. The research found that for German companies, the average annual cost of responding to attacks is around 5,7 million euros ($6,2 million). Ransomware attacks on over 70% of German companies The report also raises alarm as hackers explore how to use generative AI technology (GenAI)...

Read more

Passwordless fingerprint authentication via smart card

The new SafeNet IDPrime FIDO Bio Smart Card provides a simple, secure and fast way for users to access applications using only their fingerprint. This provides companies with a passwordless, phishing-resistant authentication solution. Thales' SafeNet IDPrime FIDO Bio Smart Card is a security key that enables strong multi-factor authentication (MFA) for businesses. This new contactless smart card allows users to quickly and securely access corporate devices, applications and cloud services by using a fingerprint instead of a password. Stolen logins responsible for every second attack According to the...

Read more

AI threatens cybersecurity
B2B Cyber ​​Security ShortNews

With the help of AI, cyber threats are taking on a new form. Criminals use this to target identities and bypass authentication mechanisms. These are all new AI attack vectors. Artificial intelligence (AI) is impacting modern society at an unprecedented pace. ChatGPT and other generative AI tools offer many advantages, but they can also be used by attackers and thus cause a lot of damage. CyberArk Labs has now examined this evolving threat landscape to better understand what new AI attack vectors mean for identity security programs and to help develop new defense strategies...

Read more

Privileged access management is too expensive for many companies
Privileged access management is too expensive for many companies

Although privileged access management provides better business protection, 58% of IT teams have not implemented one due to the cost. The international Keeper Privileged Access Management (PAM) study “Deployment Amid Economic Uncertainty” among IT and security managers shows that although PAM solutions are viewed by IT leaders as crucial to their security, budget constraints and complex solutions hinder their deployment . 56 percent of respondents tried to implement a PAM solution but were unable to fully implement it. For 92 percent, solutions that were too complex were the main reason for this. 58 percent of IT teams have not implemented a PAM solution because traditional...

Read more

Passkey management
Passkey management

Keeper now supports desktop and web browser passkey management for easy and secure passwordless use on supported websites. A leading provider of zero-trust, zero-knowledge cyber security solutions protecting passwords, privileged access, data and connections, today announces expanded support for managing passkeys across all desktop browsers and for every customer . With Keeper, passkeys are stored and managed in the Keeper Vault and can be used for easy login to websites and applications across all desktop web browsers and operating systems. Passkeys replace passwords on supported websites and can...

Read more

Effortless authentication with passkeys
Effortless authentication with passkeys

Browser extension and desktop app support storing and managing passkeys. This allows users to log into websites more securely than ever before. Passkeys are also phishing resistant and protects teams. Keeper Security announces passkey support for its platform. Passkeys are stored and managed in Keeper and can be used for easy login to websites and applications in all desktop web browsers and operating systems. The passkeys can also be exchanged between teams in companies. Simple and phishing-resistant passkeys Passkeys are easier to use than many traditional authentication methods. In addition, they are…

Read more

Zero Trust Best Practices
Zero Trust Best Practices

The rapid shift towards more remote work and the associated explosion in devices has dramatically increased the number of cyber threats. With this in mind, organizations face the challenge of protecting their highly complex cloud-based technology ecosystems as people, software and even partner organizations can pose a threat to the security of valuable systems and data. As a result, the Zero Trust approach has established itself as a popular security framework. Analyst firm Markets and Markets forecasts that global spending on Zero Trust-based software and services will grow to $27,4 billion in 2022 from $60,7 billion.

Read more

Danger from biometric data as authentication
Trend Micro News

A new study shows the dangers of stolen or leaked biometric data. Trend Micro warns that exposed biometrics pose a serious authentication risk for a variety of digital scenarios, including the metaverse. A large amount of biometric data is published on digital platforms every day. These include facial, voice, iris, palm, and fingerprint patterns that can be used to fool authentication systems. Images and audio content posted daily on social media and messaging platforms, news sites and government portals become valuable assets for cybercriminals. A new study...

Read more