News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Downstream Security Risks
B2B Cyber ​​Security ShortNews

There are many factors that increase the risk for companies. The downstream security risks are the storage of sensitive data and the increasing mobility of the workforce. Unfortunately, these factors are very difficult to get a handle on and are related to the modern type of work that is taking place today. The increasing number of vulnerabilities in IT end devices used in companies is certainly one of the biggest drivers for the growing cyber risk, as it increases the attack surface for companies. This is a pretty obvious connection to the…

Read more

Report: Security and Compliance through Zero Trust
Report: Security and Compliance through Zero Trust

Modern businesses face a number of challenges. How can the Zero Trust approach lead to increased security and compliance? A new report from 451 Research SP Global Business makes the case for simplified management and zero trust applications. The economy is under increased pressure, supply chains are being delayed and the global geopolitical environment is characterized by uncertainty. To make matters worse, the digital landscape is a cyber security nightmare – exacerbated by increasing cyber threats, the new model of working from any location, and the shortage of cyber security experts. The…

Read more

Source of risk open source licenses
Source of risk open source licenses

While vulnerabilities in open source code continue to make headlines, such as Other technologies, such as Heartbleed and Log4Shell, go unnoticed by a hidden source of open source risk - non-compliance with open source licenses. Open source software licenses are a major source of risk, Palo Alto Networks believes, because even a single non-compliant license in the software can lead to legal action, time-consuming remedial actions, and delays in getting a product to market. Despite the obvious risk, being compliant with licensing regulations is no easy feat. The variety of open source licenses and the difficulty of determining which licenses apply to a piece of software makes…

Read more

Do companies need a Chief Zero Trust Officer?
Do companies need a Chief Zero Trust Officer?

In recent years, ransomware and data breaches have caused tremendous disruption to organizations and governments. As companies drive digital transformation and move their operations to the cloud, they increasingly rely on a zero-trust model to create a resilient and secure network infrastructure. Do companies need a Chief Zero Trust Officer? Established as a cloud-based convergence of network access and security services, Secure Access Service Edge is a common approach for enterprise Zero Trust adoption. The challenge, however, is that in many…

Read more

Automated data inventory for data protection
Automated data inventory for data protection

The provider Exterro announces a new solution for data inventory. Exterro Smart Data Inventory helps organizations build, monitor, and maintain a reliable data protection program. The basis for this is a single smart and dynamic inventory of all internal and external data records, inventories and processing processes. To create an effective data protection and governance program, organizations need to be able to quickly get a real-time picture of the data they hold internally, but also to be able to keep track of data transfers with other stakeholders. Faced with massive amounts of data, many organizations struggle to maintain an accurate and up-to-date…

Read more

Big hurdles in GDPR compliance in companies

Data protection is becoming more and more important, while at the same time the amount of data is increasing rapidly. Without a strategic approach, companies are lost. Exterro shows how companies overcome the four major hurdles on the way to GDPR compliance. The large variety of compliance and data protection regulations alone is an enormous challenge. Companies have to comply with different regulations worldwide and even within Europe, which is made more difficult by the fact that these regulations are constantly changing. They are therefore faced with the difficult task of continuously adapting their internal processes so that they always comply with all specifications. Not doing so can have serious...

Read more

Proofpoint: Cloud Native Security Platform
Proofpoint: Cloud Native Security Platform

Proofpoint, Inc., one of the leading next-generation cybersecurity and compliance companies, is introducing several innovations to its three primary platforms: threat protection, compliance and the new platform for information protection and cloud security. Proofpoint's Information Protection and Cloud Security Platform, available today, is the first cloud-native solution on the market that includes Enterprise Data Loss Prevention (DLP), Insider Threat Management, Cloud App Security Broker (CASB), Zero Trust Network Access, Remote browser isolation and a cloud native web security solution combined. Hybrid working models for cloud applications "Without a doubt, humans are the new perimeter - especially when ...

Read more