News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Algorithms for post-quantum cryptography
Algorithms for post-quantum cryptography

An IT security solutions provider introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose HSM Se series hardware security modules (HSMs). The emergence of quantum computers poses a threat to today's cryptographic systems. By 2030, cryptanalytically relevant quantum computers could be available that could break common public key algorithms such as RSA or ECC. This date may seem far away, but companies must begin planning for the transition to post-quantum cryptography (PQC) now to remain secure in the future. Last year, the U.S. National Institute of…

Read more

Hacker encrypts 12.000 patient records
B2B Cyber ​​Security ShortNews

Many weeks ago, there was a hacker attack on the MVZ Herz-Lungen-Praxis Hamburg-Bergedorf, a subsidiary that manages the practice information system of the LungenClinic Grosshansdorf. The attack initially resulted in the loss of 12.000 patient records, which have not yet been fully recovered. After a long period of silence by the company, it is now clear that unknown perpetrators encrypted the practice information system with ransomware over the turn of the year. As a result, the MVZ Herz-Lungen-Praxis Hamburg-Bergedorf was no longer able to access the approximately 12.000 patient master and health records. It is also unclear whether all of the data was also lost as a result of the IT security incident...

Read more

NIS2 – how a SaaS infrastructure contributes
NIS2 - how a SaaS infrastructure contributes

It is estimated that up to 40.000 German companies will be affected by NIS2 in the future. The directive is intended to strengthen the cyber resilience and security of companies. Sven Richter of Arcserve explains how a SaaS backup solution can help ensure compliance. The NIS2 (Network Information Security Directive) sets new standards for cybersecurity. It is binding for public and private institutions in 18 sectors that either have at least 50 employees or an annual turnover and balance sheet of at least €10 million. The goal of the directive is to increase the resilience…

Read more

orchestration of email encryption
orchestration of email encryption

Email is an essential tool in a world of work that is becoming increasingly decentralized. But how can practicality, resilience and trust be combined? Encrypting data transmitted by email is essential to ensure the security of digital exchanges and to protect sensitive information, whether it is of a human, accounting or industrial nature. In addition, it is important that companies set up strict access management coupled with continuous monitoring of infrastructures to prevent intrusion attempts and quickly detect suspicious activity. When properly deployed, encryption becomes a…

Read more

Encryption against data hunger
B2B Cyber ​​Security ShortNews

The economy, states and AI are demanding more and more data from everything and everyone. Regardless of who is behind it - sensitive data must be consistently protected by functional encryption. Will even more personal data soon be stored by authorities, research institutions or health insurance companies, for example? If Friedrich Merz's latest ideas are anything to go by, then yes. He is proposing that health insurance companies give their members a discount if they make their patient data available electronically. This is just one example of many; there are numerous efforts of this kind. The police and...

Read more

security certification FIPS 140-3 Level 3
B2B Cyber ​​Security ShortNews

A specialist in hardware-encrypted USB drives and the central USB drive management SafeConsole, is represented with several storage devices on the FIPS 140-3 Modules-In-Process list of the US standardization authority NIST (National Institute of Standards and Technology). The manufacturer is thus once again underlining its pioneering role in the field of highly secure USB storage media. The external hard drive DL4 FE, the USB stick Sentry 5 and the microSSD drive Sentry K350 have passed all tests for the FIPS 140-3 Level 3 certification. DataLocker has initially received the 90B certification for the storage devices, which relates, among other things, to the generation of random numbers and the use of secure entropy sources...

Read more

Proactively identify and mitigate data risks
Proactively identify and mitigate data risks

A new, combined data security solution provides security teams and SOCs with reliable visibility and control of data risks to better detect threats to sensitive data and protect it. The solution combines the risk and threat identification capabilities of the Imperva Data Security Fabric and the Thales CipherTrust Data Security Platform. Thales announces the launch of Data Risk Intelligence, a breakthrough solution in the Imperva Data Security Fabric (DSF) that proactively addresses the risks to data, regardless of where it is stored. Since the strategic acquisition of Imperva by Thales in December 2023,…

Read more

Encrypted attacks are increasing
Encrypted attacks are increasing

A cloud security provider has released an analysis of the latest threats in the ThreatLabz 2024 Encrypted Attacks Report. Encrypted traffic has become a growing gateway for increasingly sophisticated threats, and this trend has been further amplified by the use of artificial intelligence (AI) by malware actors over the past year. ThreatLabz found that over 87 percent of all threats were transmitted over encrypted channels between October 2023 and September 2024 - a ten percent increase over the previous year. "The increase in encrypted attacks is a real problem because a...

Read more

Encryption incomplete: Akira hackers become careless
Encryption incomplete: Akira hackers become careless

Many companies give in to a ransomware attack and pay ransom to the criminals. But the attackers are also under time pressure and become careless with encryption. It can be worthwhile for companies to look for unencrypted parts on the hard drives. Here is an example of an Akira attack. An example from the work of the DCSO Incident Response Team (DIRT) shows why this happens and how this situation can be used to restore the data. The DCSO experts were commissioned by a victim of the Akira ransomware to restore the affected business-critical data. In this…

Read more

Study: Danger from lack of post-quantum cryptography
Study: Danger from lack of post-quantum cryptography Image: Bing - AI

The Entrust Cybersecurity Institute has published the results of a global survey on post-quantum cryptography. It analyzes the extent to which companies are prepared for the threats posed by quantum computing and are switching to quantum-safe encryption. The "post-quantum threat" is that quantum computers will be able to crack conventional public key cryptography within the next decade. And it is getting closer: According to the Global Risk Institute, quantum computers will endanger cybersecurity as early as 2027. Post-quantum cryptography The first three final post-quantum encryption standards were recently published by the NIST. These contain usage and...

Read more