News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Password management to protect enterprise users
Password management to protect enterprise users

New and Enhanced Workforce Password Management Features: The cloud-based enterprise password management solution allows employees to securely collect, store and manage their passwords and other application credentials. The innovations offer administrators more flexibility and control to reduce risks and improve the security of web applications. In contrast to personal password managers, Workforce Password Management is designed for enterprise environments and meets the requirements of companies in terms of data protection, availability and IT security. This includes, among other things, the support of modern passwordless authentication and directory services. New function…

Read more

IoT as a security issue
IoT as a security issue

Connected IoT devices offer huge potential for innovation - and can still pose a major problem for IT: three major security risks and recommendations for concrete measures to increase IoT security in the long term. The IoT market is growing dynamically in many areas: from smart household appliances and intelligent building systems to self-monitoring industrial plants. The networked devices offer countless advantages, but also represent a large attack surface. In detail, users should always keep an eye on three security threats that the IoT brings with it: hard-coded credentials, the infrequent IoT firmware updates and the limited IoT -Visibility….

Read more

Minimize the risk of phishing
Minimize the risk of phishing

Hardly a month goes by without warnings about new phishing attacks. Phishing remains one of the top cyber threats. With eight central measures, companies can significantly minimize the risk of attack. Attackers' phishing methods are becoming more and more sophisticated using the latest technologies. The fact that more and more employees are working on the go or from their home office and are sometimes switching between company and private devices also plays into the hands of the attackers. In addition, hackers benefit from three developments in particular: Employees are spending more and more time of their private lives online, making it easy for attackers to...

Read more

How to Avoid MFA Fatigue Attacks?
How to Avoid MFA Fatigue Attacks?

Phishing attacks are currently one of the greatest cyber threats. New variants can be observed almost every day. At the moment, there are more and more MFA fatigue attacks, as the hacker attack on the transport service provider Uber shows. CyberArk Labs have identified five common recent phishing attacks: MFA Fatigue Attacks Using SMS and voice phishing to impersonate trusted sources, attackers “tire” users with multiple MFA pushes before gaining access to the target systems. Attackers are always finding new ways to bypass MFA applications and security controls. The use of phishing-resistant MFA factors such as FIDO, QR codes or…

Read more

Also in 2023: IT security with challenges
Also in 2023: IT security with challenges

IT security is and will remain one of the top issues in business and society - also in 2023. CyberArk looks at the most important threats and challenges in the coming year - and also sees new opportunities for defenders. The public's awareness of data protection has grown, but even if many consumers are more aware of their personal data, they often find it difficult to protect it reliably. The desire for greater transparency in the handling of personal data and more control over its use will continue to increase in 2023. Web3 promises more data protection and…

Read more

Security platform: protection of identities
Security platform: protection of identities

At its CyberArk Impact 2022 security conference, CyberArk unveiled several innovations that take identity protection to a new level. The extensions relate to privileged access management, identity management, cloud security and secrets management - and thus support companies in the implementation of zero trust strategies. Companies face major challenges. On the one hand, they must minimize the security threats associated with increasing cloud use and adoption of SaaS and the resulting increase in the number of identities. On the other hand, defensive measures need to be strengthened in order to be able to face increasingly sophisticated attack scenarios...

Read more

IT security: Excuses do not protect
B2B Cyber ​​Security ShortNews

Cyber ​​risks are constantly increasing. However, the necessary investments in IT security often remain insufficient because many companies feel adequately protected. However, this is often a fallacy and associated with extremely high security risks, says security expert CyberArk. Many companies are actively driving digitization forward. However, the topic of cyber security is neglected. This is confirmed by 73 percent of the IT decision-makers surveyed in Germany in a recent study by CyberArk. Excuses instead of investments Companies give various reasons for not investing in security. Common statements are: "We are already secured enough, for example with perimeter protection."...

Read more

Cyber ​​risks are growing faster than security investments
Cyber ​​risks are growing faster than security investments

73 percent of the IT decision-makers surveyed in Germany believe that the topic of cyber security and cyber risks has taken a back seat to digital business initiatives in the past year. This is a key finding of a new study by CyberArk. The new global study "Identity Security Threat Landscape" by security experts CyberArk shows that companies are increasingly using human and machine identities. It often moves on a scale that goes into the hundreds of thousands. This inevitably poses greater cybersecurity risks for businesses. Evolution of Cybersecurity Risks Any comprehensive IT or digital…

Read more

Hardware, API Server, and Container Risks with Kubernetes
Hardware, API Server, and Container Risks with Kubernetes

Kubernetes is extremely popular, but without proper security measures, it also comes with risks. Security expert CyberArk names three specific risks and shows which defensive measures are required to get hardware, API server and container risks in Kubernetes under control. In software development today, speed and agility are key. Container technology is being used to an increasing extent. Kubernetes has emerged as the de facto standard for managing containerized workloads and services. Security Considerations in Kubernetes From a security perspective, the Kubernetes orchestration platform brings with it specific identity-related challenges that need to be addressed early in the development process. Otherwise...

Read more

Defense-in-depth approach for enhanced cyber security 
Defense-in-depth approach for enhanced cyber security

Classic security measures such as multi-factor authentication or anti-virus programs are not sufficient for comprehensive cyber security. Companies must therefore pursue a defense-in-depth approach and focus primarily on securing identities and privileged access, says security expert CyberArk. In most attacks, regardless of who is behind them, the identity layer is the first point of entry into an organization's network. In many cases, it has been shown that attackers are able to maintain persistent, undetected and long-term access in compromised environments by using legitimate credentials, among other things. MFA,…

Read more