News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Data: Complete visibility and control of the pipeline
Data: Complete visibility and control of the pipeline

A new technology offers companies a single pipeline to manage and control their petabyte-scale data collection. This enables you to carry out reliable and cost-effective analyzes and automation. Modern clouds generate an enormous amount and variety of data. Business stakeholders want more data-driven insights and automation to make better decisions, increase productivity and reduce costs. However, creating a unified and user-friendly environment for data analytics and automation is difficult due to the complexity and diversity of modern cloud architectures and the multitude of monitoring and analysis tools in companies. Data pipelines,…

Read more

Data: Reliable and accurate thanks to AI engine
Data: Reliable and accurate thanks to AI engine

Innovative AI-powered data observability features from a well-known provider ensure high quality of all externally collected data. This helps eliminate false positives and deliver trustworthy business analytics and reliable automation. Dynatrace announces new AI-powered data observability capabilities for its analytics and automation platform. Business analytics, data science, DevOps, SRE, security, and other teams can use Dynatrace Data Observability to ensure that all data on the Dynatrace platform is of high quality. Teams can track the provenance of external data Dynatrace Data Observability complements the platform's existing data cleansing and enrichment capabilities, which...

Read more

Automate compliance
Automate compliance

New laws and guidelines cause uncertainty in companies' IT departments - and also in management: The EU Commission's upcoming Cyber ​​Resilience Act (CRA) includes liability for board members and managers in companies. The German company Onekey has been researching cybersecurity vulnerabilities in smart products, such as IoT and OT devices, as well as practically all systems that are connected to the Internet, for years - and operates a Product Cybersecurity and Compliance Platform (in short: PCCP), which carries out automated testing and risk evaluation of device software. With the new integrated Compliance Wizard…

Read more

AI-based cybersecurity is still in its early stages
AI-based cybersecurity is still in its early stages

Cybersecurity managers see the great potential that lies in AI-based security solutions, but widespread implementation in companies is not yet in sight. In the past year, a gigantic AI hype broke out not only in the technology industry, but in society as a whole, linked to the question of what role it will play in various areas of life and the economy in the future. Arctic Wolf®, a leading security operations provider, releases the results of its latest artificial intelligence (AI) study, “The Human-AI Partnership.” The study was conducted by the CyberRisk Alliance among 800 IT and cybersecurity managers in large companies in...

Read more

EDR: Automatically detect and process anomalies
EDR: Automatically detect and process anomalies

The new extension of the ESET security solution for EDR significantly minimizes the response time when detecting and processing cyber incidents. This relieves the burden on those responsible for IT. The IT security manufacturer ESET has released its security solution for Endpoint Detection and Response (EDR) with an expanded range of functions as well as improved automated detection and processing of anomalies. ESET Inspect also includes the new “Incident Creator”, which significantly reduces the response time and time required for administrators to record and resolve incidents. In this way, ESET is responding to the desire of many companies to use the advantages of EDR solutions even with limited IT resources...

Read more

Cyber ​​incidents: 8 out of 10 companies have been victims
Cyber ​​incidents: 8 out of 10 companies have been victims

The study is frightening: in the last two years, 81% of German companies were affected by cyber incidents. More than half even twice. 58% of those affected therefore want to invest more in cybersecurity. According to the current Kaspersky study, more than three quarters (81 percent) of IT security experts complained about at least one IT security incident in the past two years, and 65 percent complained about at least two. Almost half (45 percent) of these were classified as “serious” and 16 percent as “very serious”. Reasons for cyber incidents According to IT security experts, among other things, a lack of necessary tools for...

Read more

Necessary DevOps automation
Necessary DevOps automation

Investing in DevOps automation brings significant benefits to organizations – including improving software quality by more than 60 percent, reducing deployment errors by 57 percent, and significantly reducing IT costs by 55 percent. These are the results of an independent global study by Dynatrace, the leading provider of unified observability and security. For the analysis, 450 IT professionals in large companies were surveyed, including 150 in Europe. However, the report also shows that automation processes in companies are still in their infancy. It also proves that data-driven and...

Read more

Better protect hybrid and multicloud environments with AI
B2B Cyber ​​Security ShortNews

Combined AI techniques help search for cyber threats in real time and respond to incidents. Dynatrace introduces Security Analytics. The new platform solution helps companies better protect themselves against threats to their hybrid and multicloud environments. Dynatrace Security Analytics leverages Davis AI, which combines predictive and causal AI techniques to deliver precise answers and the data context analysts need to prioritize and verify threats and vulnerabilities. Later this year, Security Analytics will include generative AI capabilities, expanding Davis AI's hypermodal AI offerings. Proactive defense with hypermodal…

Read more

Kerberoasting attacks using brute force methods
B2B Cyber ​​Security ShortNews

At its core, Kerberos is a protocol designed to guarantee secure authentication for both users and devices within a network environment. The special feature of Kerberos lies in the use of encrypted tickets. These make authentication easier and at the same time avoid the transmission of passwords over the network. They are encoded with a confidential key that is exchanged exclusively between the user and the authentication server. Kerberoasting is a specific form of attack that focuses on the Kerberos authentication protocol, which is a key component of Microsoft Active Directory systems. The core of a Kerberoasting attack…

Read more

Identity security with automation and AI
Identity security with automation and AI

A leader in identity security has added new capabilities to its identity security platform. By deploying automation and AI features across the platform, it becomes significantly easier to apply intelligent permission controls to all identities - human and non-human. With CyberArk's identity security platform, companies can implement zero trust and least privilege concepts with complete transparency. The platform with intelligent authorization controls offers secure access for any identity from any location and to a wide variety of IT environments and resources. With innovative functions related to automation and artificial intelligence, CyberArk improves...

Read more