News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

MITRE CVE program remains in place for the time being
B2B Cyber ​​Security ShortNews

The US government-funded CVE program is considered a crucial component in the global discovery of software flaws. Now, funding is to be temporarily secured. Funding for the CVE (Common Vulnerabilities and Exposures) program, as well as related initiatives such as the CWE (Common Weakness Enumeration), was originally not to be renewed. In the run-up to the impending discontinuation on April 16, 2025, the announcement had caused great concern in the information security industry – fears that the discovery and documentation of software vulnerabilities could become more complicated in the future. Experts call for further funding. Since its launch in 1999, the…

Read more

Passkeys: Efficient management supports CISOs
Efficient passkey management supports CISOs

New security passkey management solution supports organizations with secure authentication. It offers IT complete control over the entire security key lifecycle. Thales, the world's leading technology and security provider, announces the launch of OneWelcome FIDO Key Lifecycle Management. This is a new solution designed to help large organizations successfully deploy and manage FIDO security passkeys at scale. This announcement reflects Thales' commitment to providing its customers with a seamless and secure passwordless journey. Passwordless authentication is at the heart of OneWelcome FIDO Key Lifecycle…

Read more

IT security: pressure to innovate and shortage of skilled workers
IT security: pressure to innovate and shortage of skilled workers Image: Bing - AI

How do pressure to innovate and a shortage of skilled workers affect IT security? In IT security, new young employees often come into contact with long-established employees and sometimes cause a generational conflict. CISOs are therefore faced with new challenges. Companies are dependent on the dynamism and fresh ideas of the younger generation to counter the shortage of skilled workers and to continue to develop. However, this must not come at the expense of IT security. In order to master this balancing act, a security approach is needed that creates space for progress instead of hindering it. IT security must renew itself in order to resolve the generational conflict between the...

Read more

Security Trends 2025: AI is now part of the team
Security Trends 2025: AI is now part of the team Image: Bing -AI

Security trends 2025: AI technology is becoming more and more of an integral part of IT security. Security teams should now see AI as another team member and pull together. But that is just one trend in 2025: Added to this is the partnership between CIOs and CISOs, risk-based exposure management and a new wave of ransomware. The IT technology and security challenges of the coming year require significantly more cooperation between management and security officers. In 2025, the increased integration and consolidation of cybersecurity and IT resources should succeed in order to minimize security risks despite and through the increasing use of AI. Both for...

Read more

ROC – Risk Operations Center in the Cloud
ROC - Risk Operations Center in the Cloud Image: Bing - AI

The first of its kind in the industry, the Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM) enables CISOs and business leaders to manage cybersecurity risk in real time and transform fragmented, siloed data into actionable insights that align cyber risk operations with business priorities. Organizations are faced with an ever-growing number of risk findings spread across multiple, disconnected top-10 dashboards. This fragmented view leads to conflicting analysis, duplicate work, overlooked threats, and strategies that do not fully protect the organization. As a result, organizations struggle to establish a…

Read more

IT security: How cyber resilience changes processes
IT security: How cyber resilience changes processes

Digitalization is changing corporate cultures. More and more data is available in real time, faster and faster. But digitalization affects not only productive applications, but also data security and data backup. How can IT security be implemented and who is responsible for it? IT matter = management matter? This is not just an empty phrase, but a reality. IT is no longer just a digital desk or an extended workbench. Information and the availability of digitized processes are the basis for corporate success and are therefore central strategic components in the corporate context. At the same time, in times of increasing uncertainty and cybercriminal activities, a…

Read more

How CISOs can ensure greater cyber resilience
How CISOs can ensure greater cyber resilience Image: Bing - AI

Cyber ​​security in companies has developed significantly in recent years - but so have the techniques used by cyber criminals. But more is changing: what is the significance of generative AI (GenAI) and the shortage of skilled workers? Chief Information Security Officers (CISOs) should prepare for new developments in cyber security. The cyber threat landscape is becoming increasingly complex, and new attack patterns and techniques are putting existing cyber defenses to the test - a challenge for companies and their security officers. It remains difficult for them to respond quickly and appropriately to the rapidly changing situation. Difficulties, different...

Read more

CISOs under pressure: Should downplay cyber risks
CISOs under pressure: Should downplay cyber risks Image: MS - KI

The study results on dealing with cyber risks in companies are quite impressive. The Trend Micro study shows: Three quarters of German IT security managers (76 percent, 79 percent worldwide) feel under pressure from management to downplay cyber risks in the company. An important statement: 48 percent (41 percent worldwide) of them believe that only a serious security incident in the company would prompt management to take more decisive action against cyber risks. Why aren’t CISOs being heard? 49 percent of those surveyed in Germany (42 percent worldwide) believe that they are considered excessively negative. 32 percent (worldwide…

Read more

CISOs in 2024
CISOs in 2024

What do CISOs think will happen in 2024? One is Sergej Epp, Chief Information Security Officer (CISO) for Central Europe at Palo Alto Networks. He presents his seven predictions for CISOs in 2024. In addition, the expert provides practical recommendations for action for each of these developments that companies can use to specifically protect themselves against new threats. Prediction 1: AI will challenge CISOs In the future, companies and IT departments will have difficulty defining the exact responsibilities for artificial intelligence (AI) in the company. At the same time, attackers are using Large Language Models (LLMs) and…

Read more

Artificial intelligence in IT
B2B Cyber ​​Security ShortNews

The year 2023 could go down in history as the year of artificial intelligence (AI) – or at least the year that businesses and consumers alike raved about generative AI tools like ChatGPT. IT security solution providers are not immune to this enthusiasm. At the RSA Conference 2023, one of the leading international conferences in the field of IT security, the topic of AI was addressed in almost every presentation - for good reason. AI has enormous potential to transform the industry. Our security researchers have already identified the use of AI by hackers...

Read more