News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

The AI ​​Act and its consequences for data protection
The AI ​​Act and its consequences

The AI ​​Act is the first law for AI and gives manufacturers of AI applications between six months and three years to adapt to the new rules. Anyone who wants to use AI in sensitive areas will have to strictly control the AI ​​data and its quality and create transparency - classic core disciplines from data management. The EU has done pioneering work and, with the AI ​​Act, has regulated what is currently the most dynamic and important branch of the data industry, just as it did with the GDPR in April 2016 and the Digital Operational Resilience (DORA) in January of this...

Read more

Shadow IT becomes Shadow AI
Shadow IT becomes Shadow AI

The path for users to AI is very short; entry is gentle, easy and often free of charge. And that has massive consequences in the form of shadow IT, which should be familiar to companies from the early stages of the cloud. The potential of generative AI has sparked a real gold rush that no one wants to miss. This is shown by a study by Censuswide on behalf of Cohesity, a global provider of AI-powered data management and security. 86 percent of 903 companies surveyed are already using generative AI technologies. Avoid loss of control In the past, public cloud services have sparked a gold rush in…

Read more

90 percent of companies pay ransoms
90 percent of companies pay ransoms

90 percent of companies have paid ransoms in the last two years in order to quickly get their data back after cyber attacks, close leaks and maintain operations. This is shown by a study by Censuswide on behalf of Cohesity, a global provider of AI-powered data management and security. According to the survey, 93 percent of the international companies surveyed want to continue to pay ransoms in the event of a security attack and violate their “do-not-pay” guidelines in an emergency. Only 1 percent of companies categorically rule out paying ransoms. 35 percent of companies…

Read more

Ban on ransomware payments
B2B Cyber ​​Security ShortNews

The US government wants to convince nation states to stop paying ransoms for ransomware. The aim is to ensure that cybercriminals' business model is drained. In addition, states that indirectly support ransomware should be isolated internationally and the associated infrastructure dismantled. This could be the hoped-for starting point for a global ban on ransomware payments. Legal risks Companies often resort to this last resort in an emergency to buy out their hijacked data and systems. Taking this emergency exit is becoming increasingly risky. Companies will soon have to expect that ransomware will pose legal risks in addition to downtime costs...

Read more

The GDPR and the AI ​​Act
The GDPR and the AI ​​Act

The GDPR has now been in force for five years and the European Commission wants to improve the regulation in the first half of the year. In concrete terms, binding deadlines for forwarding complaints and a general processing deadline for complete complaint procedures are to be introduced. The EU will regulate the topic of AI separately in the “AI Act”, whereby GDPR and AI are closely intertwined, as the ban on ChatGPT in Italy shows. Mark Molyneux, EMEA CTO at Cohesity, explains how companies can use the potential of AI for themselves while controlling legal risk and formulates four concrete recommendations: Legal,…

Read more

New regulations of the operational safety regulation
New regulations of the operational safety regulation

New regulations of the Industrial Safety Ordinance (BetrSichV) now stipulate that potential security gaps in the software and the measurement, control and regulation technology (MSR) and their degree of danger must be assessed. Operators of systems that require monitoring such as elevators, tank farms or biogas plants, steam boilers and other pressure vessels are now obliged to identify potential cyber threats. If the operator has not carried out a corresponding risk assessment, there is a defect that can result in penalties. Wolfgang Huber, Regional Director Central Europe at the security specialist Cohesity, explains how companies can meet these legal requirements despite limited resources: "IT teams are already benefiting from their security architecture...

Read more

Data security and data management
Data security and data management

A leader in data security and management presents the new software version 7.0 of Cohesity Data Cloud. It offers customers additional functions for data security. Cyber ​​attacks are becoming more and more sophisticated and companies therefore want to implement comprehensive defense strategies in order to continue their business operations if the worst comes to the worst. Above all, they want to improve the security and management of their data by following a data-centric approach to cyber resilience. This includes core capabilities such as data immutability, data isolation (or cyber-vaulting), and near-instant recovery of data at scale. Cohesity addresses these challenges of today's...

Read more

Policies: Will cyber attacks become uninsurable?
Policies: Will cyber attacks become uninsurable?

The increasing number of cyber attacks and the damage they cause have led to an increasing demand for cyber insurance. If cyberattacks soon become "uninsurable," as Zurich Insurance CEO Mario Greco said in an interview with the Financial Times, what can companies do to meet this challenge? More than 400 million US dollars - that's how much damage the data leak at Capital One caused in 2019. And the number of such attacks, which have catastrophic consequences for the companies affected, has continued to increase since then. In the third quarter alone...

Read more

Ransomware: Legacy technology makes businesses more vulnerable 
Ransomware: Legacy technology makes businesses more vulnerable

The results of a new global study commissioned by Cohesity show that nearly half of the companies surveyed are using legacy backup and recovery infrastructure to manage and protect their data. Forty-nine percent of respondents say their solutions were built before 49—well before the multicloud era and onslaught of cyberattacks organizations are facing today. In addition, many IT and security teams do not appear to have a concrete plan for how to proceed in the event of a cyber attack. Nearly 2010 percent of respondents expressed concern when asked if their…

Read more

Germany: 223 billion euros in damage from cyber attacks
Germany: 223 billion euros in damage from cyber attacks

According to a Bitkom study, cyber attacks cause 223 billion euros in damage to the German economy every year. Ransomware and blackmail software accounts for around 20 percent of these. Three ways out of the ransom trap. The hackers encrypt data, fail systems and, increasingly, steal data from their victims' networks. In an open letter, a group of IT security and information technology experts called on federal politicians to take action and demanded specific legal measures to counteract ransom payments, among other things. Paying ransom is the wrong way The need for action is undisputed and ransom…

Read more