News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Controlled, secure AI support for financial institutions
Controlled, secure AI support for financial institutions Image: Bing - AI

Due to the increase in electronic commerce, the requirement for financial institutions to adequately protect this data has also increased rapidly. Many cyber attacks are targeted at the financial sector. The PCI security standards specify how the financial sector must adapt to the latest security requirements. The PCI DSS standards define strict security controls and processes for companies involved in payment transactions. In addition, they set requirements for developers and solution providers to develop and securely manage payment devices, software and solutions in the industry according to these standards. Support for financial institutions in using AI Cloudera announces compliance with...

Read more

Expansion of cyber protection is partly stalling in companies
Expansion of cyber protection is partly stalling in companies Image: Bing - AI

According to management, the main reasons for expanding cybersecurity in companies in Germany, Austria and Switzerland are the increasing awareness of economic consequences. On average, 10 percent of companies in the DACH region also stated that they had not made any investments in cybersecurity in recent years. According to current figures from the Sophos Management Study, the threat of economic damage from cyberattacks is the main reason for investing in cyber protection. Managers in Germany and Austria cite awareness of the economic consequences of cyberattacks as the main reason for investing, with 23,4 percent (D) and 24 percent (AUT) respectively.

Read more

Ransomware attacks: 44 percent detected in the network
Ransomware attacks: 44 percent detected in the network Image: Bing - AI

A recent Barracuda analysis for 2023/24 shows that 44 percent of all repelled ransomware attacks were detected during lateral movement within the network. It is also clear that healthcare continues to be the most popular target for attackers. New research shows that lateral movement within a network is the clearest sign of an impending ransomware attack - almost half (44 percent) of identified ransomware attacks were detected in this way, according to a Barracuda study. A quarter (25 percent) of incidents were detected when attackers began creating or editing files....

Read more

Cybersecurity: Leadership does not understand the threat
B2B Cyber ​​Security ShortNews

Business leaders, executives and IT decision-makers around the world do not seem to know how to protect their company and thus their digital assets such as data and information from cyber attacks, according to a recent Kaspersky study. Almost half of the executives in companies do not understand basic terms such as malware, phishing or ransomware. In addition to this obvious knowledge gap, the current shortage of skilled workers in the IT security industry, budget constraints and untrained employees are exacerbating the cyber risk for companies and organizations. Corporate management does not understand the threat Does the executive team know what it is doing? The Kaspersky study "Enterprise cybersecurity and increasing threats in the…

Read more

AI in cybersecurity: both a weapon and a cure
AI in cybersecurity: both a weapon and a cure

Many IT security experts agree that generative AI is THE solution to increasingly complex cyberattacks. AI could fill the gap left by the lack of qualified security staff. But cyber criminals have also jumped on the AI ​​bandwagon and are using it for their own purposes. Check Point Software Technologies, a leading provider of an AI-powered, cloud-based cyber security platform, has teamed up with market researchers at Vanson Bourne to find out how security experts plan to incorporate generative AI (GenAI) into their security architecture. The key findings from the study are presented here. Europe has the highest skills deficit of all regions Although…

Read more

NIS2 Directive: 6 tips for implementation in companies

The EU NIS2 directive will soon oblige many companies to meet higher cybersecurity standards - the law is expected to be ready in October 2024. What do security managers need to consider now? How do IT teams cope with the additional tasks? And to what extent can information security management systems (ISMS) help? indevis knows the most pressing questions and has the right tips. The EU NIS2 directive has a clear goal: to strengthen resilience and responsiveness to cyber threats. In Germany, 27.000 companies could be affected by the new regulations - a tenfold increase in the number of companies that previously fell into the KRITIS area. The German...

Read more

IT security: Lack of knowledge in German companies
IT security: Lack of knowledge in German companies

Around 25 percent of all management teams know too little about IT security and 42 percent of employees do not regularly inform themselves about current cyber threats, according to the results of a G Data study. If employees are not up to date on the subject of IT security, companies are more vulnerable to cyber attacks such as phishing or ransomware. This can result in critical data being stolen or systems being paralyzed, which causes considerable financial damage. It is therefore worrying that, according to the representative study "Cybersecurity in Figures" by G DATA CyberDefense AG, around 42 percent of German employees...

Read more

EU cybersecurity certification
EU cybersecurity certification

The "European Cybersecurity Scheme on Common Criteria" (EUCC) is now the first systematic approach to cybersecurity certification. The criteria of the certification scheme were designed by the European Union Agency for Cybersecurity (ENISA) and must now be implemented in the member states - the necessary legal act for implementation ("Implementing Act") was recently published. "The EUCC enables manufacturers to monitor the IT security of products such as technology components, hardware and software according to a standard and to analyze them for vulnerabilities. This also paves the way for the upcoming requirements of the...

Read more

Cybersecurity analysis: What structure does the company use?

The company's organizational structure has far-reaching effects on its cybersecurity. Based on a survey, Sophos examines three organizational scenarios and assesses their effectiveness in cybercrime defense. A dedicated cybersecurity team as part of the IT organization achieves the best results. But not every company has that. Finding trained and experienced specialist staff is one of the major challenges in companies to ensure cybersecurity. Given this discussion, it is therefore particularly important to enable the few available specialists to achieve the greatest possible impact in defending against cyber risks. In this…

Read more

New wave of phishing: Attackers use Adobe InDesign
New wave of phishing: Attackers use Adobe InDesign

Currently, there is an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. According to Barracuda telemetry, the number of emails containing Adobe InDesign links has increased by almost 30 times since October. Previously, the daily number was around 75 emails per day, but now it has increased to around 2.000. Almost one in 10 (9 percent) of these emails contain active phishing links. Many of these links have the top-level domain ".ru" and are hosted behind a content delivery network (CDN) that acts as a proxy for the source site. This…

Read more