News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Data manipulation, the underestimated danger
Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of having a current and easily accessible copy of all important company data to protect against data manipulation. Reliable backups enable faster recovery from damage, interruption or data loss; and especially if files have been encrypted or deleted by a ransomware attack. However, these well-known backup scenarios remain rare. Immutable backups can also protect against the more underestimated threats of data manipulation or malicious insiders. Unforeseeable activities that can significantly damage the trust and reputation of a brand if not...

Read more

Global Threats: Data Protection for Local Data

Ransomware attacks, data stealer attacks, exploits for vulnerabilities: Even if the attacks are global, they are aimed at local, partly decentralized data storage. Here it is important to rethink data protection and use other solutions. The Federal Office for Security and Information Technology (BSI) recorded 68 successful ransomware attacks, i.e. an average of more than one success for cyber criminals per week, in 2023. In the IT Security Germany 2023 management report, the BSI reports an average of 2000 new vulnerabilities in software products per year A quarter of a million new malware variants every month and every day. However, alongside the threats,...

Read more

Automate compliance
Automate compliance

New laws and guidelines cause uncertainty in companies' IT departments - and also in management: The EU Commission's upcoming Cyber ​​Resilience Act (CRA) includes liability for board members and managers in companies. The German company Onekey has been researching cybersecurity vulnerabilities in smart products, such as IoT and OT devices, as well as practically all systems that are connected to the Internet, for years - and operates a Product Cybersecurity and Compliance Platform (in short: PCCP), which carries out automated testing and risk evaluation of device software. With the new integrated Compliance Wizard…

Read more

NIS2 policy and container security
B2B Cyber ​​Security ShortNews

The digital landscape in Europe is facing a significant change with the publication of the NIS2 Directive. The implementation of this digital transformation is closely linked to the development of cyber security. Governments around the world are now taking action to increase the protection of critical infrastructure from cyber threats. This policy, which aims to increase security and resilience in the cyber environment, particularly affects the growing number of Kubernetes users. Understanding NIS2 The NIS2 Directive consists of a landmark regulation that addresses cyber security and digital infrastructure in the European Union. Your main goal is to…

Read more

Outlook: Cybersecurity 2024
B2B Cyber ​​Security ShortNews

The threat in Germany's cyberspace is "tense to critical" and "higher than ever before," summarizes the BSI in its current 2023 management report. Those responsible for security must now draw conclusions from the findings and adapt and optimize previous security concepts. Not only will the topic of ransomware pose major challenges in the coming months, but also the trend topic of the year: artificial intelligence. Joseph Carson, Delinea's Chief Security Scientist and Advisory CISO, looks at five trends and developments in cybersecurity for 2024: Attack and defend with…

Read more

Compliance with AI in the company
Compliance with AI in the company

The almost limitless possibilities of LLMs (Large Language Models) are incredibly exciting. Each month there are new uses for these tools that are not always compatible with corporate compliance policies. The possibilities range from quickly and inexpensively creating thumbnails for blog posts, to the behavior of people who fundamentally oppose and criticize a blog post, to coherently translating blog posts into other languages ​​- while fully understanding the content. Even in the world beyond blog posts, this nascent tool holds tremendous…

Read more

The struggle with compliance guidelines
The struggle with compliance guidelines

European companies are concerned about the future: four in five are more concerned about compliance than they were five years ago. In more than half of the cases (57%), the burden lies on the shoulders of the IT department. This was the result of the new IT compliance survey that Hornetsecurity published at Infosecurity Europe 2023, which is currently taking place in London. Necessary controls not possible Of particular concern is that 69% of those surveyed stated that adhering to compliance guidelines had a "moderate" to "extreme" impact on the operations of the respective IT department. But…

Read more

NIS2 compliance
NIS2 compliance

In 2017, Cybersecurity Ventures predicted that the global cost of damage from ransomware will reach $2021 billion by 20, which is also the current estimate for 2022 - and at 57 times the financial damage of 2015. The global security market is currently having one Valued at around US$150 billion, which is projected to rise to US$208 billion by the end of the year and US$400 billion in 2026, according to current forecasts. Data also shows that EU companies spend, on average, 41 percent less on cybersecurity than US companies. State of…

Read more

Assess cyber resilience
Assess cyber resilience

Numerous cyberattacks and data breach headlines are a constant reminder to businesses that cybersecurity is fragile. The remote working model increases the burden on IT and security teams as there is no longer a well-defined network boundary. Telemetry data published in Absolute's 2023 Resilience Index shows that corporate device locations have increased by 15 percent. This means that significant amounts of employees are now working on networks that are not owned or controlled by the company, dramatically increasing the risk to an organization. Over and beyond…

Read more

Modernize IT infrastructure
B2B Cyber ​​Security ShortNews

During the winter holidays, Southwest Airlines, one of the US's largest and most respected airlines, was forced to cancel around 45 percent of its scheduled flights. It is likely due to outdated IT infrastructure and IT systems. Other airlines have also struggled with inclement weather and holiday traffic, but have not faced the same level of disruption. These few examples show that when companies are using an outdated, inefficient IT infrastructure, it will eventually buckle under the pressure of unexpected changes. Some companies hold on to their legacy systems because they don't see the point in doing anything...

Read more