News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Container security also offers attack surfaces
Container security also offers attack surfaces

Risk awareness, classic cyber security principles and specific countermeasures increase the security of data and processes. IT managers use their own container security or those provided by cloud service providers in order to set up agile and flexible applications and operate processes. Ultimately, however, containers are also executable applications and can be dangerous. Container host servers and registries extend the attack surface. Classic principles of IT security and an increased sensitivity to threats help to close emerging gaps. Containers in the cloud or on-premise containers - whether kept privately or provided via a cloud provider - offer hackers ...

Read more

AI-based XDR platform against threats
AI-based XDR platform against threats

Google Cloud and Cybereason introduce first AI-based XDR platform that collects and analyzes threat data from across the IT environment on a global scale. The XDR company Cybereason and Google Cloud announce the availability of Cybereason XDR, powered by Google Chronicle. With the Extended Detection and Response solution (XDR), defenders are able to predict and detect cyberattacks in the company and react to them at maximum speed - whether at endpoints, in networks, identities, in the cloud or in individual work environments. Powered by Google Chronicle "Together, Cybereason and Google Cloud Deliver the ...

Read more

Five cybersecurity predictions for 2022
Five cybersecurity predictions for 2022

The seismic change in the world of work since the beginning of the global pandemic continued in 2021. The surge in cloud, mobility and security initiatives has proven critical for businesses to weather the emerging cybersecurity threats. The Verizon 2021 Data Breach Investigations Report documents that phishing and ransomware attacks have increased by 11 percent and 6 percent, respectively, as never before have so many people worked outside of their office as in 2021. Cyber ​​criminals have taken advantage of the security issues that have emerged resulting from the new model of teleworking and collaboration. To the ...

Read more

Multi-factor authentication: multiple protection against hackers
Multi-factor authentication: multiple protection against hackers

The high number of attacks in which compromised login data are misused shows that passwords alone are no longer sufficient as a trustworthy identification of legitimate users, but that the use of multi-factor authentication (MFA) has become a fundamental building block for corporate security. MFA requires users to provide convincing proof of their identity in addition to their login credentials. According to Microsoft, MFA can prevent identity-based attacks based on stolen credentials up to 99,9 percent. Even if a user's credentials are compromised, MFA attackers make it extremely difficult to circumvent the authentication requirements. How does multi-factor authentication work? MFA complements the authentication process ...

Read more

WatchGuard: Cloud platform receives endpoint security functionalities
WatchGuard: Cloud platform receives endpoint security functionalities

WatchGuard expands its cloud platform with additional endpoint security functionalities. Patch management, encryption and other features relevant to end device protection are now integrated in WatchGuard Cloud. WatchGuard Technologies is massively promoting the vision of establishing a central IT security platform. Four more endpoint security service modules have just been integrated into WatchGuard Cloud. Now the functions "WatchGuard Patch Management", "WatchGuard Full Encryption", "WatchGuard Advanced Reporting Tool (ART)" and "WatchGuard Data Control" are also available to users and partners in this way. The IT security specialist thus offers customers and partners central access for far-reaching security solutions, ranging from comprehensive endpoint protection to…

Read more

BOX.com: Multi-factor authentication has been canceled
B2B Cyber ​​Security ShortNews

The multi-factor authentication of Box.com could be bypassed by attackers. The Varonis research team discovered a way to replace MFA with classic one-factor authentication for box accounts. Box.com joins the long list of cloud providers where MFA vulnerabilities were recently uncovered: The Varonis research team discovered a way to replace MFA with classic one-factor authentication for Box accounts, the authentication -Use apps like Google Authenticator. Attackers with stolen credentials could compromise a company's box account and exfiltrate sensitive data without having to use a one-time password. Box.com vulnerability closed in the meantime Security researchers identified this vulnerability in Box on ...

Read more

Black Friday weekend was DDoS attack weekend
B2B Cyber ​​Security ShortNews

Cyber ​​attacks on Black Friday weekend broke records and were twice as high as last year. The companies were faced with a flood of DDoS attacks that have now exceeded the terabit limit. The past Cyber ​​Weekend not only attracted bargain hunters to the Internet. The latest evaluations by the IT security provider Link11 show that cyber criminals also tried to seize the opportunity. According to evaluations by the Link11 Security Operations Center (LSOC), they covered companies with DDoS attacks in order to damage them or to extort bitcoins. However, the number of attacks this year was even higher than expected ...

Read more

New cloud-managed Wi-Fi 6 security access points
B2B Cyber ​​Security ShortNews

EnGenius uses the latest cloud security technology to protect enterprise networks from unauthorized devices and data threats. ECW230S and ECW220S are two new cloud-managed Wi-Fi 6 security access points (APs) that work with the EnGenius AirGuard ™ system. As remote network access and the growing number of Bluetooth / IoT devices create more attack surface than ever before, enterprise networks are increasingly vulnerable to data breaches and cyberattacks. In response, EnGenius has expanded its security capabilities with new Wi-Fi 6 cloud managed security APs that are suitable for privacy sensitive financial, medical and distributed enterprise networks. XNUMX/XNUMX threat scan Unlike other Wi-Fi security solutions that operate outside of the ...

Read more

WatchGuard expands cloud platform to include WLAN management
WatchGuard expands cloud platform to include WLAN management

On the basis of the WatchGuard Cloud, managed service providers can now offer all function modules of the WatchGuard portfolio "from a single source" including WLAN management and new Wi-Fi 6 access points. After the successful integration of Panda's endpoint security solutions in the middle of the year, WatchGuard Technologies has once again expanded its WatchGuard Cloud security platform: From now on, WatchGuard's WLAN products can also be administered online at the same location. Last but not least, this gives managed service providers the opportunity to offer extensive security services on the basis of a centrally managed platform that integrates all WatchGuard technologies. This includes…

Read more

Disaster recovery as a service after a ransomware attack
Disaster recovery as a service after a ransomware attack

Minimize downtime and data loss after ransomware attacks. Cohesity Disaster Recovery as a Service is available immediately with enhanced recovery capabilities from Cohesity SiteContinuity. Just months after releasing its Backup as a Service (BaaS) solution, Cohesity, a leading provider of data management solutions, announced the general availability of Disaster Recovery as a Service (DRaaS). This new offering extends the recovery capabilities of Cohesity SiteContinuity. Amazon Web Services (AWS) as a recovery location In addition, Amazon Web Services (AWS) can be used as a recovery location for failover and failback in a software-as-a-service (SaaS) model. This not only offers customers ...

Read more