News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

NIS2 requirements: What exactly do they mean?
NIS2 requirements: What do they mean in concrete terms? Image: MS-KI

NIS2 requires companies to undertake a comprehensive overhaul of their cybersecurity practices and forces them to assess and improve their supply chain protection measures. The directive affects more than 160.000 companies operating in the EU. Here's a closer look at the new requirements. The NIS2 directive builds on the foundation of its predecessor from 2016 and is a response to the increasing number of supply chain attacks and the need for more robust reporting procedures across Europe. This directive affects more than 160.000 companies operating in the EU, particularly those operating in 15 key sectors…

Read more

Attack detection for more cyber security in medium-sized companies
Attack detection for more cyber security in medium-sized companies

The German Cyber ​​Security Organization (DCSO) is now providing an expanded range of cyber security services as a managed service. Medium-sized companies in particular thus receive protection for their IT infrastructure from a single source around the clock. More and more small and medium-sized companies are currently being targeted by IT attacks. Because compared to large companies, they often have less sophisticated security systems and cyber know-how and therefore offer an easier target for ransomware & Co. In addition, their IT and security teams are usually not on duty around the clock. SMBs are more vulnerable to attacks…

Read more

Employees thwart IT security technology
Employees thwart IT security technology

The security situation in German companies is increasingly threatened by careless and criminal employees. A study entitled "Cybersecurity in Germany: Better protection of people and data" reveals the many forms of misconduct that employees of German companies display. In 41 percent of the companies surveyed, their own negligent or careless employees were the cause of data loss in the last 12 months. For example, they opened email attachments infected with malware, accessed fake websites and filled out fake online forms, or disclosed sensitive information. In 30 percent of the cases, employees were…

Read more

A lack of skilled workers endangers cyber security
A lack of skilled workers endangers cyber security

Trellix survey: According to a recent study, a lack of skilled workers endangers cyber security in 85% of all companies. Global survey of cybersecurity professionals shows ways out of the skills shortage. Trellix, a cybersecurity expert and pioneer in innovative XDR technologies, presents the results of a recent survey looking at the shortage of cybersecurity professionals and its impact. The alarming finding: 85% of participants stated that the skills shortage is affecting their companies' ability to ensure the security of increasingly complex IT systems and networks. At the same time, almost a third (30%) of…

Read more

BSI updates German cyber security situation after Russian attack
B2B Cyber ​​Security ShortNews

In view of the situation in Ukraine, the Federal Office for Information Security (BSI) continuously assesses the situation related to information security. It also assesses the cyber security situation in Germany. Furthermore, the BSI recognizes an abstractly increased threat situation for Germany. For the BSI, however, there is currently no acute immediate threat to information security in Germany in connection with the situation in Ukraine. According to the BSI, this rating can change at any time. Continued increased danger for Germany The BSI therefore continues to call on companies, organizations and authorities to...

Read more

Defense-in-depth approach for enhanced cyber security 
Defense-in-depth approach for enhanced cyber security

Classic security measures such as multi-factor authentication or anti-virus programs are not sufficient for comprehensive cyber security. Companies must therefore pursue a defense-in-depth approach and focus primarily on securing identities and privileged access, says security expert CyberArk. In most attacks, regardless of who is behind them, the identity layer is the first point of entry into an organization's network. In many cases, it has been shown that attackers are able to maintain persistent, undetected and long-term access in compromised environments by using legitimate credentials, among other things. MFA,…

Read more

Remote work: intelligent cybersecurity technologies
Remote work: intelligent cybersecurity technologies

In the course of the digital transformation, the world of work is changing - and the effects are also noticeable for the IT department. Remote work, cloud computing and personal, unmanaged mobile devices bring with them numerous new risk factors that require agile, effective cybersecurity measures. This also changes the way IT professionals work. The effects of digital transformation are making themselves felt in the business world on numerous levels. Typical company processes can also be continued virtually. A product presentation, for example, can be streamed live, the meeting with the department can take place as an online meeting and collaboration can be carried out regardless of time and location via ...

Read more

Holistic digitization and cybersecurity for industry
B2B Cyber ​​Security ShortNews

New foundation K4 DIGITAL: Holistic digitization and cybersecurity for industry. A dozen renowned industry and security experts ensure industrial security that goes far beyond classic IT security. Under the umbrella of K4 DIGITAL GmbH, twelve of the most renowned German security and industry experts formed in the last quarter of 2020 to implement the topic of cybersecurity for industrial companies in a new, holistic form. In contrast to the typical IT-centered approach of a classic system house service, K4 DIGITAL supports companies and organizations in the planning and implementation of cross-company security processes in order to protect them against current and future cyber risks.

Read more