News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Make remote work hacker-proof
Make remote work hacker-proof

Working from home is still booming. This is why comprehensive protection against hacker attacks is so important for remote work. Each data breach causes costs of over 4 million euros on average. It is therefore extremely important for companies to protect data against loss and theft, even when working remotely. Valentin Boussin, Country Manager Germany at the French secure conferencing specialist Tixeo, explains how remote work can be made more secure. Target of attack: online communication One of the popular targets from which hackers steal data is online communication from companies. This is given that many companies are heavily relying on video conferencing, they…

Read more

Ransomware survey: Over 70 percent would pay in an emergency

Cohesity study: When it comes to cyber resilience and recovery, 73 percent say their company would pay a ransom if it could recover data and business processes faster, especially when a full restore is needed. 94 percent of those surveyed in Germany confirm that the ransomware threat in their industry has increased in 2023: almost every second German company (48 percent) has been attacked in the last six months. Almost every second company was attacked. Cohesity interviewed 2 decision-makers (3.400 of them from Germany) from the areas of IT and security operations (SecOps) about ransomware....

Read more

Native protection for VMs in Azure
Native protection for VMs in Azure - Image by Gerd Altmann from Pixabay

The new version Zerto 10 for Microsoft Azure is ideal for native protection for VMs in Azure. It brings an improved solution for disaster recovery and mobility, also supports multi-volume VMs and offers improved scale-out efficiency for more infrastructure flexibility. Zerto, a Hewlett Packard Enterprise company, introduces Zerto 10 for Microsoft Azure. The solution provides enhanced disaster recovery (DR) and data mobility capabilities to help organizations protect their Azure workloads from increasingly sophisticated threats. Core of the improvements in Zerto 10 for Microsoft…

Read more

Cyber ​​resilience: How fatal are mistakes
Cyber ​​resilience: how fatal errors can be - Image by Gerd Altmann from Pixabay

The consequences of a cyber attack can be devastating. They range from financial loss to reputational damage to legal repercussions. And the risk increases. Three mistakes usually lead to high risk and damage from cyberattacks Recent studies confirm that ransomware attackers manage to encrypt the data in 71 percent of attacks and that paying a ransom doubles the overall recovery costs. In addition, data is stolen in 30 percent of ransomware attacks in Germany. Build strong cyber resilience The good news: Organizations can protect themselves against…

Read more

New malware implant threatens industrial companies
New malware implant threatens industrial companies

Companies from the industrial sector in Eastern Europe were attacked by a threat actor with advanced implants and novel malware. Cloud-based data storage services have been used to exfiltrate data and then proliferate malware. Kaspersky has uncovered a series of targeted attacks on industrial companies in Eastern Europe aimed at establishing a persistent channel for data exfiltration. These attacks shared significant similarities with previously studied attacks such as ExCone and DexCone; this suggests the involvement of APT31, also known as Judgment Panda and Zirconium. The attacks used advanced implants that…

Read more

Networks: Cybersecurity through transparency
Network: Cybersecurity through transparency

The new "Visibility Without Borders" platform is intended to secure networked work by companies and increase performance. Provider NETSCOUT promises companies to create more transparency in network traffic and data structures. NETSCOUT has presented its Visibility Without Borders (VWB for short) platform, which provides companies with a uniform data framework for the areas of performance, availability and security to maintain the flow of goods and services. It does this by proactively identifying areas of complexity, vulnerability and risk, enabling detailed insights, thereby increasing transparency, improving agility and securing corporate data and applications. Smart Data Real-time metadata generated from…

Read more

Data security in companies - with sustainability!
Data security in companies - with sustainability!

High data security in companies with revision-proof storage does not have to be achieved with constant hardware replacement. Sustainability is also when existing, older devices are compatible with the latest developments, such as many Silent Cubes. According to a current study by the European Parliament, around 14% of the e-waste collected in Germany is made up of IT and telecommunications equipment. The countless old devices, especially notebooks and smartphones, which are rarely recycled, are not taken into account. In German companies, the entire old IT infrastructure is replaced with new devices every four years on average, while a smartphone…

Read more

Teleworking and BYOD as a security risk
Teleworking and BYOD as a security risk

A specialist in endpoint and cloud security, today released its new report, The State of Remote Work Security. The company's goal is to educate IT and security leaders about the growing threats associated with telecommuting (remote work) and BYOD (bring your own device) policies. The results of the study make it clear that in remote and hybrid work, private and professional tasks are merging and the boundaries between the two areas have become more permeable. Lookout data shows that 32 percent of remote and hybrid workers use apps or software that don't...

Read more

Data security and data management
Data security and data management

A leader in data security and management presents the new software version 7.0 of Cohesity Data Cloud. It offers customers additional functions for data security. Cyber ​​attacks are becoming more and more sophisticated and companies therefore want to implement comprehensive defense strategies in order to continue their business operations if the worst comes to the worst. Above all, they want to improve the security and management of their data by following a data-centric approach to cyber resilience. This includes core capabilities such as data immutability, data isolation (or cyber-vaulting), and near-instant recovery of data at scale. Cohesity addresses these challenges of today's...

Read more

Early threat detection and zero loss strategy
Early threat detection and zero loss strategy

Commvault, a leading provider of data and information management in cloud and on-premises environments, has introduced its data security service Metallic ThreatWise with threat detection and zero-loss strategy. The solution provides technologies for early detection of even unknown cyber threats, even before they reach their target and affect business operations. According to a survey conducted by the Enterprise Strategy Group, only 12 percent of IT leaders surveyed felt confident they had the right tools and protection required anywhere, to protect data both in the on-premises data center and in the cloud . Early warning function for…

Read more