News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

More cybersecurity tools = more protection?
More cybersecurity tools = more protection?

As strange as it sounds, companies using more cybersecurity tools doesn't necessarily mean they're better protected against threats. A cybersecurity expert gives three concrete examples of why companies should not only rely on their software to protect their IT infrastructure. On paper, the Defense in depth cybersecurity strategy looks better than almost any other security concept: Layer by layer, a variety of cybersecurity tools and procedures are used to provide close-knit protection around the company's IT infrastructure. This approach is not new, but in practice it shows...

Read more

Five levels for the highest security
Five pillars for the highest level of security

Companies large and small are facing an increasing number of cyberattacks, while at the same time the amount of sensitive data is increasing. Going without a Security Operations Center (SOC) is like playing with fire - because the next attack is sure to come. Ontinue, an expert in Managed Extended Detection and Response (MXDR), has put together a complete solution for the cybersecurity game. If “cybersecurity” were a PC or console game, it would probably be a so-called cooperation strategy game: In order to successfully defend themselves against hackers, companies need a strong basis (security infrastructure) and excellent teamwork. Co-op games have similar requirements for...

Read more

Basics of Effective Security Operations (SecOps)
Basics of Effective Security Operations (SecOps)

The ongoing threat of cyber attacks continues to pose major challenges for companies. Many people now rely on external providers when it comes to SecOps. But even then, IT security is not a sure-fire success; it requires certain prerequisites. Ontinue, expert in Managed Extended Detection and Response (MXDR), defines five core principles that are crucial for the success of SecOps. IT security experts summarize all operational activities in their area of ​​expertise under the term SecOps - i.e. security operations. Since the portfolio of tasks is very broad, companies need a Security Operations Center (SOC) to manage their IT infrastructure...

Read more

How data helps to ward off IT threats
How data helps to ward off IT threats

To effectively protect a company's IT, cybersecurity teams and security operations centers (SOC) must closely monitor it - to do this they need data and metrics. Which metrics are particularly valuable at the user, endpoint and network level is explained Ontinue, leading expert in Managed Extended Detection and Response (MXDR). EDR (Endpoint Detection and Response) tools and SIEM (Security Information and Event Management) platforms provide cybersecurity professionals with security-relevant information from the endpoint level to the user and network levels. MXDR expert Ontinue gives examples of essential metrics of the respective security level that companies should always keep an eye on...

Read more

AI solution customizes protection against security threats
AI solution customizes protection against security threats

Three new AI-powered capabilities help detect and respond to cyber threats faster, freeing up enterprise security teams. The integration of AI in solutions for IT security has increased in recent years, this particularly affects the integration of large language models. However, the use of AI has mostly been limited to better understanding threat behavior in order to strengthen detection and mitigation. The use of AI to adapt MDR services to customer environments and thereby individualize the service has been minimal until now. This offers many advantages,…

Read more