News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Impact of NIS2 on cybersecurity in healthcare
Impact of NIS2 on healthcare cybersecurity

The revision of the EU directive on increasing cybersecurity for critical infrastructures (NIS2) has brought the issue of cybersecurity even more into focus in many healthcare facilities. Because they are considered particularly worthy of protection. Confidentiality, integrity and availability of data are of central importance in the healthcare sector. This is where entire health processes and diagnoses, including therapy plans, are documented. Since every security breach carries the risk that medication plans will be manipulated or information will fall into the hands of third parties, cyber security is essential. The sensitive data is an extremely popular target for criminals, as was the case recently with the attack on...

Read more

Defense best practices
Defense best practices

A cybersecurity company that illuminates, examines and remediates internal and external risks released the results of its second report on trends in external cyber defense, highlighting the new risks facing organizations outside the traditional IT environment. “As enterprise attack surfaces continue to expand, cyber threat actors are adapting their strategies to exploit new vulnerabilities,” said Joel Molinoff, Global Head of Supply Chain Defense at BlueVoyant. “BlueVoyant conducted this research to shed light on the attack vectors that organizations need to be aware of and provide recommendations for action to combat the latest threats.”…

Read more

Threatened blockchain security
Threatened blockchain security

The exponential rise of blockchain technology and cryptocurrencies has redefined finance and digital transactions. But with great potential comes great risks. According to a report by CNBC, over 2021 billion euros worth of cryptocurrencies were stolen by hackers in 13. This alarming statistic highlights the urgent need to increase the security of blockchain ecosystems. In order to prevent further disasters of this kind, it is therefore worth drawing lessons from the existing cases for future crypto security strategies. Terra Luna and Wormhole One of the significant events that shaped the cryptocurrency…

Read more

Minimize the risk of phishing
Minimize the risk of phishing

Hardly a month goes by without warnings about new phishing attacks. Phishing remains one of the top cyber threats. With eight central measures, companies can significantly minimize the risk of attack. Attackers' phishing methods are becoming more and more sophisticated using the latest technologies. The fact that more and more employees are working on the go or from their home office and are sometimes switching between company and private devices also plays into the hands of the attackers. In addition, hackers benefit from three developments in particular: Employees are spending more and more time of their private lives online, making it easy for attackers to...

Read more

Hackers: Best Practices for Security Orchestration
Hackers: Best Practices for Security Orchestration

Security Symphony Against Hackers: Best Practices for Security Orchestration. All security solutions should be integrated into one system to simplify administration. A comment from Tim Bandos, Chief Information Security Officer, Digital Guardian. There was a time when IT teams viewed it as bad practice to have two separate antivirus programs running on the same device. Most IT teams today use multiple security tools and solutions at the same time. However, there is a need for a technology that can combine the protection and security functions of these tools. This is where the security orchestration comes in ...

Read more