News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cybersecurity in federal IT inadequate according to the Federal Court of Auditors 
B2B Cyber ​​Security ShortNews

The Federal Audit Office once again warns of serious IT security gaps in the federal administration. A confidential report to the Bundestag's Budget Committee reveals massive deficits in the federal government's digital infrastructure, as reported by media outlets such as Der Spiegel and Heise Online. The report presents alarming findings. In July 2025, a new confidential report from the Federal Audit Office was released, sharply criticizing the cybersecurity of federal IT. According to the portal Der Spiegel, less than 10% of the federal government's more than 100 data centers meet the applicable minimum standards for IT security. The auditors complain that the federal government is not adequately prepared for current threats...

Read more

Cybersecurity in procurement: cost pressure and lack of standards
Cybersecurity in purchasing: cost pressure and lack of standards Image: depositphotos

Cybersecurity: The biggest structural deficits lie in the standardization of security criteria and the strategic weighting of security over costs. Large companies struggle with internal coordination, while smaller businesses struggle with a lack of expertise. The importance of cybersecurity in purchasing is growing, but many purchasing departments in German companies are facing significant challenges. This is shown by a recent Sophos survey of 201 purchasing managers from various industries and company sizes. Cost optimization as the biggest obstacle. The four biggest challenges among all respondents are: Focus on cost reduction instead of long-term security (45 percent); Lack of or barely standardized security criteria in…

Read more

When bosses ignore cybersecurity
When bosses ignore cybersecurity Image: depositphotos

The current study once again examined how CEOs and C-level management in Germany, Austria, and Switzerland evaluate their security measures. Many now recognize the benefits of good cybersecurity, but rarely use them as a strategic advantage. The Sophos Management Study "Boss, what's your take on cybersecurity?" (Part II) examines the cybersecurity strategies of companies in Germany, Austria, and Switzerland from the perspective of C-level management. IT professionals were expressly not surveyed. The study analyzes how companies evaluate their security measures, what investments they have made, and what expectations they have of policymakers...

Read more

SMEs: Tailor-made cybersecurity in the world of AI attacks
SMEs: Tailored cybersecurity in the world of AI attacks - Image: Bing - AI

The digital threat landscape is evolving rapidly, and small and medium-sized businesses are constantly facing new challenges. Cybercriminals are now using artificial intelligence (AI) to specifically exploit security vulnerabilities and make attacks more efficient. If you think your company is "too small" for such attacks, think again – around 467.000 new malicious files are discovered every day, and 93% of all attacks target widely used Windows systems. In the current white paper, security experts explain why cyberattacks can be costly for companies: On average, one incident causes damage amounting to...

Read more

Man vs. Machine: Race for Cybersecurity Supremacy
Human vs. Machine: Race for Cybersecurity Supremacy Image: Bing - AI

The advantages of AI in cybersecurity are obvious: AI is available around the clock, processes even masses of complex data, and can react extremely quickly. Are humans now obsolete? Not at all; human expertise remains essential. The integration of artificial intelligence (AI) into cybersecurity has triggered a race between humans and machines. While AI systems are capable of recognizing patterns and identifying anomalies, human expertise remains essential for understanding and neutralizing complex threats. Has the dynamic relationship between human…

Read more

25 years with numerous cybersecurity challenges
25 years with numerous cybersecurity challenges

As we approached the year 2000, the IT and business worlds fretted about the infamous "Y2K bug"—a seemingly insignificant date glitch that would potentially cripple global computer systems. In the end, catastrophe didn't occur. But the concern back then was a harbinger of how deeply intertwined our daily routines are with technology and security. Today, 25 years later, we face far more complex and invisible threats. Just consider the opportunities AI opens up for hackers. We can already say with certainty that...

Read more

KRITIS in the sights of the attackers
B2B Cyber ​​Security ShortNews

The drastic increase in cybersecurity incidents in German KRITIS facilities by 43 percent from 2023 to 2024 is a clear warning signal for the entire industry. This development shows that critical infrastructures are increasingly being targeted by cyber criminals, while at the same time the digital dependence of these facilities continues to grow. The most recent cyber attack on the CDU party headquarters in spring 2024 and the attack by the Russian hacker group APT 28 on the SPD party headquarters from December 2022 are just two examples that show how state-controlled actors are specifically attacking democratic institutions. While in the case of the CDU, Chinese attackers are suspected...

Read more

Data Security for Databricks
Data Security for Databricks

A specialist in data-centric cybersecurity is expanding the coverage of its data security platform to Databricks. This enables critical data from the data intelligence platform to be continuously identified and classified, risks eliminated, and threats detected and stopped. Thousands of companies worldwide rely on Databricks to create, deploy, share, and maintain data, analytics, and AI solutions. While cloud platforms like Databricks offer high performance and flexibility, they also increase risk as the amount of data grows. This is why a proactive, data-centric approach is required that recognizes where sensitive data is located and is able to...

Read more

AI-based cybersecurity tools – a question of trust

Despite the hype: Almost 60 percent of German companies see potential deficiencies in cybersecurity tools based on generative AI as a major problem when dealing with artificial intelligence. A report shows that SMEs are more distrustful here than large companies. The new report entitled "Beyond the Hype: The Businesses Reality of AI for Cybersecurity" by Sophos takes a closer look at the use of AI in cybersecurity and gives tips on how to use the technology correctly. In parallel with the preparation of this report, 2024 IT professionals in Germany were surveyed in December 200 in cooperation with Techconsult...

Read more

Cybersecurity is an illusion
Cybersecurity is an illusion

Everyone from interns to CEOs has heard the long-worn phrase "There is no such thing as 100% cybersecurity". But as with many universally accepted sayings, the crucial question here is: what follows from this? In the context of cybersecurity, the answer should be: a rethink. Absolute security is not only unattainable, it is also unnecessary. The variety of sources of error alone makes it clear that systems can never be fully protected - from zero-day exploits, the exploitation of an as yet undetected vulnerability, and undocumented maintenance access to new attack methods and even human...

Read more