News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

AI in cybersecurity: both a weapon and a cure
AI in cybersecurity: both a weapon and a cure

Many IT security experts agree that generative AI is THE solution to increasingly complex cyberattacks. AI could fill the gap left by the lack of qualified security staff. But cyber criminals have also jumped on the AI ​​bandwagon and are using it for their own purposes. Check Point Software Technologies, a leading provider of an AI-powered, cloud-based cyber security platform, has teamed up with market researchers at Vanson Bourne to find out how security experts plan to incorporate generative AI (GenAI) into their security architecture. The key findings from the study are presented here. Europe has the highest skills deficit of all regions Although…

Read more

NIS2 Directive: 6 tips for implementation in companies

The EU NIS2 directive will soon oblige many companies to meet higher cybersecurity standards - the law is expected to be ready in October 2024. What do security managers need to consider now? How do IT teams cope with the additional tasks? And to what extent can information security management systems (ISMS) help? indevis knows the most pressing questions and has the right tips. The EU NIS2 directive has a clear goal: to strengthen resilience and responsiveness to cyber threats. In Germany, 27.000 companies could be affected by the new regulations - a tenfold increase in the number of companies that previously fell into the KRITIS area. The German...

Read more

IT security: Lack of knowledge in German companies
IT security: Lack of knowledge in German companies

Around 25 percent of all management teams know too little about IT security and 42 percent of employees do not regularly inform themselves about current cyber threats, according to the results of a G Data study. If employees are not up to date on the subject of IT security, companies are more vulnerable to cyber attacks such as phishing or ransomware. This can result in critical data being stolen or systems being paralyzed, which causes considerable financial damage. It is therefore worrying that, according to the representative study "Cyber ​​Security in Figures" by G DATA CyberDefense AG, around 42 percent of German employees...

Read more

EU cybersecurity certification
EU cybersecurity certification

With the “European Cybersecurity Scheme on Common Criteria” (EUCC), there is now a first systematic approach to certifying cybersecurity. The criteria of the certification scheme were designed by the European Union Agency for Cybersecurity (ENISA) and must now be implemented in the member states - the necessary legal act for implementation (“Implementing Act”) was recently published. “The EUCC enables manufacturers to monitor the IT security of products such as technology components, hardware and software according to a standard and to analyze them for vulnerabilities. This also paves the way for meeting the upcoming requirements of…

Read more

Cybersecurity analysis: What structure does the company use?

The company's organizational structure has far-reaching effects on its cybersecurity. Based on a survey, Sophos examines three organizational scenarios and assesses their effectiveness in cybercrime defense. A dedicated cybersecurity team as part of the IT organization achieves the best results. But not every company has that. Finding trained and experienced specialist staff is one of the major challenges in companies to ensure cybersecurity. Given this discussion, it is therefore particularly important to enable the few available specialists to achieve the greatest possible impact in defending against cyber risks. In this…

Read more

New wave of phishing: Attackers use Adobe InDesign
New wave of phishing: Attackers use Adobe InDesign

There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. According to Barracuda Telemetry, the number of emails containing Adobe InDesign links has increased nearly 30x since October. While the daily number was previously around 75 per email per day, it has now increased to around 2.000. Almost one in 10 (9 percent) of these emails contain active phishing links. Many of these links have the top-level domain “.ru” and are hosted behind a Content Delivery Network (CDN) that acts as a proxy for the source site. This…

Read more

Companies spend 10 billion euros on cybersecurity
B2B Cyber ​​Security ShortNews

Germany is arming itself against cyber attacks and is investing more than ever in IT and cyber security. In the current year, spending is expected to increase by 13,1 percent and, at around 10,5 billion euros, will exceed the 10 billion euro mark for the first time. The digital association Bitkom reports this based on data from the market research institute IDC. This means that the IT security market in this country is growing faster than in the rest of Europe (plus 12,3 percent to 46,0 billion euros) and in the rest of the world (plus 11,4 percent to 164,8 billion euros). “Cyberattacks are currently one of the biggest threats…

Read more

Prevent malicious software from starting
Prevent malicious software from starting

A cyber protection provider has added a new feature to its security platform. It improves cybersecurity by preventing malicious or unwanted applications from launching on end devices. Malwarebytes, a global leader in real-time cyber protection, is launching Application Block, a new, free feature for users of its ThreatDown platform. The feature creates an additional layer of security that prevents unwanted or malicious applications from launching on the protected end devices. Less attack surface - more endpoint security This reduces the attack surface of the devices and often already busy IT teams are relieved. The function can be easily activated via…

Read more

National IT Situation Center
B2B Cyber ​​Security ShortNews

Federal Interior Minister Nancy Faeser recently opened the new National IT Situation Center of the Federal Office for Information Security (BSI) in Bonn. Bitkom President Dr. Ralf Wintergerst: “Cyber ​​attacks are currently one of the biggest threats to our economy and society: Last year, the German economy suffered 206 billion euros in damage through theft of IT equipment and data as well as digital and analogue industrial espionage and sabotage. We welcome the fact that the BSI is improving the conditions for preventing and combating cyber crime with the new National IT Situation Center. So that companies and authorities can protect themselves accordingly,...

Read more

Machine learning in cybersecurity
Machine learning in cybersecurity

For a dynamic and powerful security platform, machine learning (ML)-based tools can be an essential element. The technology can be used in a variety of tasks, such as detecting malware and network anomalies, categorizing user behavior, prioritizing vulnerabilities and threats, and also accurately predicting future attacks. Additionally, their use can help improve model risk, streamline threat classification – and even accurately predict immediate and potential attacks. In addition, ML-based automation relieves employees by minimizing manual effort. So ML has a lot…

Read more