News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​Resilience Act: Companies should act now
Cyber ​​Resilience Act: Companies should act now

The Cyber ​​Resilience Act (CRA) is coming fast. For manufacturers, this means that devices with exploitable security vulnerabilities will soon no longer be allowed to be sold in the EU. It's high time for companies to adapt their product development to become CRA-compliant. "Companies subject to the EU Cyber ​​Resilience Act (CRA) should hurry to adapt their products to the CRA requirements," says Jan Wendenburg, CEO of the Düsseldorf-based cybersecurity company ONEKEY. He points out that the first CRA regulations will come into effect as early as September 2026, and all subsequent ones will take effect on December 11, 2027...

Read more

Cybersecurity: Automatically check connected devices
Cybersecurity: Automatically check connected devices

Suppliers and users can now easily and automatically check the cybersecurity and compliance of the software in their networked devices, machines, and systems using a platform solution in compliance with laws and regulations. Security vulnerabilities are uncovered by the platform and can then be remedied specifically. The Product Cybersecurity and Compliance Platform from cybersecurity company ONEKEY now supports the RED II (EN 303-645) standard in addition to ETSI 18031 1 and the Cyber ​​Resilience Act (CRA). This allows suppliers and users to automatically check whether the software in their networked devices, machines, and systems contains potential violations.

Read more

NIS2 – how a SaaS infrastructure contributes
NIS2 - how a SaaS infrastructure contributes

It is estimated that up to 40.000 German companies will be affected by NIS2 in the future. The directive is intended to strengthen the cyber resilience and security of companies. Sven Richter of Arcserve explains how a SaaS backup solution can help ensure compliance. The NIS2 (Network Information Security Directive) sets new standards for cybersecurity. It is binding for public and private institutions in 18 sectors that either have at least 50 employees or an annual turnover and balance sheet of at least €10 million. The goal of the directive is to increase the resilience…

Read more

Compliance Assistant supports DORA implementation

Compliance Assistant makes it easier to minimize risks and reduce time-consuming configuration checks under DORA. The app also provides transparent insights that are precisely tailored to the requirements of the DORA regulation. Dynatrace is expanding its existing compliance functions to support the EU Digital Operational Resilience Act (DORA) regulation. In this context, Dynatrace is introducing Compliance Assistant. The app is specifically designed to provide companies with transparency, insights and automation. This enables them to minimize risks and reduce time-consuming compliance configuration checks related to DORA. DORA introduces companies…

Read more

Need for action regarding DORA
Need for action regarding DORA

Why financial institutions must act now to ensure operational resilience regarding DORA. With the Digital Operational Resilience Act (DORA) finally coming into force on January 17, 2025, financial institutions across the EU are faced with the urgent task of significantly strengthening their cybersecurity and operational resilience. DORA introduces comprehensive requirements ranging from reporting security incidents to managing risks along the supply chain. The aim is to better protect the financial sector from the ever-growing cyber threats. Despite the clear deadline, many organizations remain underprepared, which has negative consequences for both…

Read more

A strategy for Mobile Device Management (MDM)
A strategy for Mobile Device Management (MDM)

70% of employees in modern companies now use four or more endpoints every day, as a study by the Enterprise Strategy Group shows. This presents IT administrators with the growing challenge of keeping track of all these endpoints and their functioning. Since IT staff and time are already scarce, a well-thought-out strategy for mobile device management (MDM) and also specialized MDM software are more than ever a must, not only for security reasons, but also from an economic and efficiency perspective. Ensuring security, functionality and data protection is in…

Read more

How to achieve NIS2 compliance
How to achieve NIS2 compliance

By October 17, 2024, the new EU directives on network and information security (NIS2) must be implemented by all member states through local legislation. The EU sets a penalty limit of up to 10 million euros or 2 percent of global annual turnover. Germany could decide on even stricter requirements and higher penalties. In addition, company management can be held personally liable for violations. Today, companies of all sizes and industries are constantly attacked by cyber criminals. To date, there has been no generally applicable directive in the EU for protective measures. The first NIS version only affected a few companies and...

Read more

Increase in ransomware attacks and compliance failures
Increase in ransomware attacks and compliance failures

An annual report highlights the latest threats, trends and emerging topics in data security. It is based on a survey of almost 3.000 (262 in Germany) IT and security experts in 18 countries and 37 industries. This year's report found that 93% of IT professionals believe security threats are increasing in scope or severity, a significant increase from 47% last year. The number of companies affected by ransomware attacks increased by over 27% last year (32% in Germany). Despite this escalating threat, fewer...

Read more

Data manipulation, the underestimated danger
Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of having a current and easily accessible copy of all important company data to protect against data manipulation. Reliable backups enable faster recovery from damage, interruption or data loss; and especially if files have been encrypted or deleted by a ransomware attack. However, these well-known backup scenarios remain rare. Immutable backups can also protect against the more underestimated threats of data manipulation or malicious insiders. Unforeseeable activities that can significantly damage the trust and reputation of a brand if not...

Read more

Global Threats: Data Protection for Local Data

Ransomware attacks, data stealer attacks, exploits for vulnerabilities: Even if the attacks are global, they are aimed at local, partly decentralized data storage. Here it is important to rethink data protection and use other solutions. The Federal Office for Security and Information Technology (BSI) recorded 68 successful ransomware attacks, i.e. an average of more than one success for cyber criminals per week, in 2023. In the IT Security Germany 2023 management report, the BSI reports an average of 2000 new vulnerabilities in software products per year A quarter of a million new malware variants every month and every day. However, alongside the threats,...

Read more