News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

NDR and machine learning against data exfiltration
NDR and machine learning against data exfiltration

Many companies are unable to effectively prevent data exfiltration and data theft. According to Exeon, the most common causes of such exposure of confidential and private data are cyberattacks and human error. NDR and machine learning are powerful tools against data exfiltration. Only timely detection of vulnerabilities and cyberattacks can prevent data from being exfiltrated and then published by malicious actors or used to obtain ransoms. The increasing complexity of networks and application environments is making it increasingly difficult for companies to reliably prevent exfiltration. Many gateways – mostly because of…

Read more

More security with MDR – Cybersecurity as a Service
More security with MDR – Cybersecurity as a Service - Image by Gerd Altmann on Pixabay

NDR – Network Detection & Response is now considered a security technology in IT security that should not be missing from any company network. But who evaluates all the data and leads the response? The magic word here is MDR – Managed Detection and Response Services. An interview with Michael Veit, security expert at Sophos. Effective security solutions include technological components such as networked endpoint protection, a next generation firewall, both paired with artificial intelligence and human expertise in the form of security services. While classic security solutions can detect and ward off a large number of attacks and malicious anomalies, it has long...

Read more

Identity and Access Management (IAM) alone is not enough
Identity and Access Management (IAM) alone is not enough - Image by Gerd Altmann on Pixabay

Although the zero trust strategy usually includes comprehensive Identity and Access Management (IAM), the Swiss security specialist Exeon Analytics warns against relying predominantly on IAM. Zero Trust is all too often based primarily on constant verification of user identities, which is ineffective in cases of stolen identities, says Exeon. Zero Trust is an overarching security strategy that aims to continuously audit and verify access to resources both internally and externally. It is based on the principle that network devices and users must constantly prove their identity because...

Read more

ML helps detect anomalies
B2B Cyber ​​Security ShortNews

Many security teams still rely on static signatures to detect threats. They either rely on an intrusion detection system (IDS) for network analysis or on static behavioral detections based on endpoint logs. But with more and more data, it becomes difficult to keep track and cover all sources and attack patterns with individual rules. To overcome these challenges, Exeon says machine learning (ML) algorithms help change the perspective of detection development. Anyone who uses ML can learn the normal state of communication, recognize deviations and...

Read more

Report: IT leaders believe XDR is necessary
Report: IT leaders believe XDR is necessary

A new study underscores the uncertainty surrounding XDR definition, implementation and required resources. The ExtraHop report shows that 78 percent of the IT managers surveyed consider the topic of XDR to be necessary, despite irritation. ExtraHop has released the results of the study "To Achieve the Promise of XDR, Look Beyond the Endpoint" examining the adoption of Extended Detection and Response (XDR) in organizations. The global study highlights the successes, obstacles, challenges and hesitations of companies that have developed or are considering an XDR strategy. Despite the uncertainty, nearly a third of...

Read more

NDR plus endpoint detection and response
NDR plus endpoint detection and response

Vendor ForeNova is expanding its Network Detection and Response (NDR) protection and an Endpoint Detection and Response (EDR) solution. This is intended to better protect the network in connection with the endpoints. ForeNova now offers NovaGuard, an Endpoint Detection and Response (EDR) solution. NovaGuard supplements the network traffic-based detection and defense against threats by the NDR protection NovaCommand by protecting the endpoints. NovaGuard shares its information with NovaCommand and network security specialist ForeNova's managed detection and response services. Additional protection for the endpoint Endpoint protection opens up an additional…

Read more

Intrusion prevention even with encrypted network traffic
Intrusion prevention even with encrypted network traffic NDR

A reliable IPS - Intrusion Prevention System should also protect against encrypted network traffic and zero-day attacks. However, since many solutions work with signature-based detection, they cannot usually protect against zero-day attacks. The new NDR from ExeonTrace does IPS at the same time. With ExeonTrace, the Swiss security company Exeon Analytics offers a solution for detecting intruders that goes far beyond the capabilities of conventional intrusion prevention systems (IPS). In particular, ExeonTrace can also detect zero-day attacks, against which IPS solutions cannot offer any protection due to their signature-based detection. Such systems are suitable...

Read more

EDR without NDR with weaknesses in protection
EDR without NDR with weaknesses in protection

The Swiss security company Exeon Analytics warns against only relying on conventional EDR solutions (Endpoint Detection & Response) when securing endpoints. Because the agent software does not always run at the end point, which creates weaknesses in the defense network. Many endpoints in modern, hybrid networks do not support the agents required for this, and where such agents are running, they can be undermined and deactivated by sophisticated attacks. Also, because of the trend towards working from home and BYOD (Bring Your Own Device), IT and security teams often don't have access to privately owned endpoints...

Read more

NDR push by analyzing metadata 
NDR push by analyzing metadata

With the analysis of metadata instead of the usual Deep Packet Inspection (DPI), the Swiss cybersecurity company Exeon Analytics is establishing a modernized and future-proof Network Detection & Response (NDR) solution in the European market. In contrast to the established methods based on DPI, the metadata analysis is not affected by encrypted data traffic. This is relevant as modern cyber attacks such as APTs, ransomware and lateral movements rely heavily on encrypted communication for attack instructions from remote command and control servers (C&C). Encrypted metadata catches the eye Traditional NDR solutions typically detect such processes using comprehensive data analysis,…

Read more

The role of AI and ML in cybersecurity
The role of AI and ML in cybersecurity

The constantly increasing number of successful cyber attacks demonstrates how often attackers achieve their goals despite modern prevention solutions. As a result, the focus is increasingly on technologies that serve to quickly discover ongoing attacks - NDR (Network Detection & Response). Artificial intelligence - AI - and machine learning - ML-based systems play a major role here. However, since these terms are often mixed up and for many companies the topic of "AI & ML" is still a closed book, Andreas Riepen, Head of Central and Eastern Europe at Vectra AI, raises three fundamental questions...

Read more