News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Politically motivated attacks by hackers
B2B Cyber ​​Security ShortNews

The nature of cyberattacks is changing. In the past it was mostly about blackmail, today it's also about destruction. The fact that political tensions are spreading into the digital space has a direct and noticeable impact on German companies. You have to ensure that you are cyber-resilient, because cyber defense at the national level in Germany has so far been quite patchy. The days when cyberattacks were primarily aimed at financial gain are over. Already at the beginning of the Ukraine war, Russian hacker groups intensified their attacks on German companies. As the Israel-Palestine conflict flares up, politically motivated attacks have continued to rise and...

Read more

AI-supported cyber defense via cloud platform
AI-supported cyber defense via cloud platform

The new cloud platform “Commvault Cloud” combines data security and AI-supported defense against cyber risks. It integrates the Microsoft Azur OpenAI service. A new cleanroom recovery service makes it possible to recover data reliably and without any remnants of malware attacks. Commvault has announced its new AI-powered cloud platform “Commvault Cloud”. Commvault Cloud brings together all of the company's SaaS and software offerings into one platform that enables IT leaders to manage data visibility and control in a holistic, centralized manner. Designed specifically for cyber resilience, the new platform enables users to predict risk faster, achieve a clean recovery free of attack remnants...

Read more

Cyber ​​resilience: Insufficiently prepared despite fear of attacks
Cyber ​​resilience: Insufficiently prepared despite fear of attacks

In a study, managers from the areas of security and IT operations commented on cyber resilience in their company. The majority expect an attack. Commvault has released a new IDC report commissioned by Commvault entitled “The Cyber-Resilient Organization: Maximum Preparedness with Bullet-Proof Recovery Survey.” In this report, IDC surveyed more than 500 security and IT operations executives worldwide to get an up-to-date overview of how organizations perceive modern security threats and how they are strengthening their cyber resilience. The key findings of this report can be summarized in…

Read more

Renewable energy systems inadequately secured
Renewable energy systems inadequately secured

In April 2022, a few months after the Russian attack on Ukraine began, three wind energy companies in Germany were hit by cybercriminals. The attacks paralyzed thousands of digitally controlled wind turbines. It is estimated that by 2050, the world's power systems will depend on 70 percent renewable energy, primarily from solar, wind, tidal, rain and geothermal sources. These energy sources are typically decentralized, geographically remote, and relatively small. They are often managed and operated using insufficiently secured digital technologies that are directly linked to the aging infrastructure of national electricity grids…

Read more

Strengthen resilience against cyber attacks
Strengthen resilience against cyber attacks

A leading provider of self-healing, intelligent security solutions, has announced the further expansion of its ecosystem of Absolute Application Resilience. Joint customers can now apply Absolute's firmware-embedded persistence technology to improve the resiliency of more than 80 mission-critical security and business applications. Recent additions include NetSfere, ActivTrak Agent, HP TechPulse, Dell SupportAssist, Symantec Management Agent, BUFFERZONE Safe Workspace, Octopus Pro and Syxsense Responder. Robust Security Controls With the alarming increase in cyber security risks and disruptions, there is an urgent need for robust security controls that…

Read more

The European Cyber ​​Resilience Act
B2B Cyber ​​Security ShortNews

The European Cyber ​​Resilience Act (CRA) is a landmark piece of legislation. It will address a number of current weaknesses in the European technology market, while further reducing future risks through increased responsibility and transparency on the part of software and application providers. The time for implementation is already running. After all, vulnerabilities in the software supply chain continued to make headlines in 2023, highlighting the significant impact of a single vulnerability on potentially thousands of businesses and individuals. These incidents have highlighted the need for cybersecurity standards that cover the entire software development lifecycle (SDLC). It's encouraging...

Read more

Cybersecurity: identifying risks and managing them proactively
Cybersecurity: identifying risks and managing them proactively

The new 'Cymulate Exposure Analytics' solution enables users to carry out 'Continuous Threat Exposure Management', with which risks and resilience can no longer only be controlled reactively, but also proactively. Cymulate has announced the launch of Cymulate Exposure Analytics, a groundbreaking new solution for organizations looking to implement an informed CTEM (Continuous Threat Exposure Management) program. CTEM is a term coined by Gartner, Inc. to describe a program designed to diagnose the severity of vulnerabilities, create an action plan for remediation, and ensure business and...

Read more

Security analysis provides information on cyber resilience
Security analysis provides a statement on cyber resilience - Photo by Jan Tinneberg on Unsplash

The new Cymulate Exposure Analytics solution uses security analyzes to show customers how their cyber resilience is - from the attacker's perspective and tailored to the business context. Cymulate, the leader in exposure management and security risk validation, announces the launch of Cymulate Exposure Analytics, a groundbreaking new solution for organizations looking to implement a robust CTEM (Continuous Threat Exposure Management) program. CTEM is a term coined by Gartner, Inc. to describe a program designed to diagnose the severity of vulnerabilities, create an action plan to eliminate them, and…

Read more

Identity-related risks are increasing
Identity-related risks are increasing

The new global study "2023 Identity Security Threat Landscape" shows that identity-based cybersecurity risks continue to rise. The reasons for this are, on the one hand, the difficult economic conditions and, on the other hand, the pace of technological innovation, including the dynamic development of artificial intelligence (AI). Businesses continue to drive digital and cloud initiatives. Failure to invest adequately in cybersecurity will quickly result in a larger, unsecured, identity-centric attack surface. CyberArk's Identity Security Threat Landscape Report takes stock. Developments in Germany Almost all respondents (99%) expect an increase in identity-related risks...

Read more

Assess cyber resilience
Assess cyber resilience

Numerous cyberattacks and data breach headlines are a constant reminder to businesses that cybersecurity is fragile. The remote working model increases the burden on IT and security teams as there is no longer a well-defined network boundary. Telemetry data published in Absolute's 2023 Resilience Index shows that corporate device locations have increased by 15 percent. This means that significant amounts of employees are now working on networks that are not owned or controlled by the company, dramatically increasing the risk to an organization. Over and beyond…

Read more