News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

ThycoticCentrify improves Secret Server usability
B2B Cyber ​​Security ShortNews

Improved Secret Server usability through automated and simplified secret management: With new security controls, automation features and design updates, the new version of the Secret Server offers companies more protection and greater productivity when managing secrets. ThycoticCentrify, a leading provider of cloud identity security solutions formed from the merger of two leaders in privileged access management (PAM), Thycotic and Centrify, is expanding the capabilities of its award-winning PAM solution, Secret Server. With new security controls, automation features, and design updates, Secret Server builds on its industry-leading secret management capabilities and ease of use to provide more protection...

Read more

Secure e-mail transmission in the cloud is gaining in importance
Secure e-mail transmission in the cloud is gaining in importance

In 2021, email will be 50 years old. During this time, it has long established and proven itself as the main means of communication in everyday business. This will not change in 2022 either - on the contrary: by 2025, general email usage will increase rapidly. In view of the fact that many companies are currently moving their office and e-mail applications to the cloud, the importance of e-mail security is becoming more important again. Because hackers don’t stop at applications like Microsoft 365 either. With professional solutions, however, it is also possible here…

Read more

Thousands of unsafe web servers on popular websites
F5 news

TLS Telemetry Report 2021 analyzes encryption and certificates. More than half of all web servers still allow the use of insecure RSA keys. At the same time, the revocation of certificates is still problematic. In addition, there are old, rarely updated servers almost everywhere. This is shown by the TLS Telemetry Report 2021 from F5 Labs, which regularly examines the 1 million most important websites worldwide. According to the study, attackers are increasingly using Transportation Layer Security (TLS) to their advantage in phishing campaigns. In addition, new fingerprinting techniques raise questions about the spread of malware servers, which are in the main ...

Read more

Care services: Manage the personal data of persons in need of care and staff in a legally secure manner
B2B Cyber ​​Security ShortNews

Nursing services have been subject to the strict provisions of the General Data Protection Regulation (GDPR) since 2018. But many providers have been taking the associated data protection requirements "quite loosely" for years. TeamDrive helps care services to manage the personal data of people in need of care, relatives and staff in a legally secure manner. Often personal data, medical information and accounting files are sent unencrypted by email. If the violations are exposed, severe penalties are imminent. In addition, owners or managing directors are usually held personally accountable in the event of data protection violations. Data management service creates legal certainty The Hamburg-based TeamDrive GmbH wants to provide a remedy with its data management service of the same name. TeamDrive ensures ...

Read more

Guide to the current state of quantum secure cryptography
B2B Cyber ​​Security ShortNews

The BSI, the Federal Office for Information Security, publishes guidelines on the current status of quantum-secure cryptography. The report can be downloaded free of charge from the BSI. Quantum computers, quantum cryptography and quantum technologies - developments in this area seem increasingly confusing. The new guidelines of the Federal Office for Information Security (BSI) "Designing cryptography quantum-secure - basics, developments, recommendations" summarizes the current state of research. The guideline provides a comprehensive overview of the fundamentals, illuminates the interrelationships of the latest developments, discusses current measures and names open research questions. He also describes the opportunities and risks of ...

Read more

For home office: TeamDrive brings an improved version 
B2B Cyber ​​Security ShortNews

With the new version, TeamDrive brings an optimization for the home office: data is just as safe at home as in the office. New setting for permanent encryption increases security. According to the provider, the new version 4.7 is the “safest TeamDrive” of all time. The cloud-based sync and share service recommends 2-factor authentication and encrypts locally stored data. These and all other security options can either be set by each individual user or prescribed by the administrator of a company account for all workplaces in the company. "TeamDrive has been relying on 2-factor authentication for installation and use for a long time ...

Read more

Can quantum computers crack all cryptography?

Quantum computers are able to completely and irreversibly break the most widely used public key procedures today. Post-quantum cryptography can prevent this. But how safe are the new procedures and what should be considered when implementing them? What sounded like science fiction a few years ago is now within reach: quantum computers with a previously unknown computing power endangering today's cryptography - and thus the entire digital infrastructure. Quantum computers: the danger that comes from the future Although it will probably take a few years before it can be used across the board, it still applies ...

Read more

Encryption and 2-factor authentication for SMEs
B2B Cyber ​​Security ShortNews

Prevent cyber attacks and data theft with reliable encryption and 2-factor authentication. HiCrypt and SmartLogon ensure more simplicity in implementation. The number of cyber attacks on German companies has increased dramatically in recent years. Studies show that data theft, sabotage or espionage affect the entire economy and the damage runs into billions. And the trend towards home offices since the beginning of the pandemic means additional IT security challenges, says Matthias Kirchhoff, Managing Director of digitronic computersysteme gmbh. The IT service provider offers solutions for the reliable encryption of sensitive data as well as a 2-factor authentication that doesn't leave a backdoor ...

Read more

Conpal LAN Crypt available for macOS
Conpal LAN Crypt available for macOS

The enterprise encryption solution Conpal LAN Crypt is now also available for macOS devices. Mac users can use it to exchange files with role-based encryption from the company network among users of all common platforms. Due to the user-specific cryptography, Conpal LAN Crypt allows companies to easily implement data authorization concepts. Once set up, the data remains encrypted regardless of where it is located. The solution ensures that the files can only be decrypted by authorized persons. The high encryption standard is particularly suitable for regulated industries and security-critical work areas such as research and development. The solution also supports smart card-based keys….

Read more

Mobile working with encrypted documents

Security in your pocket: mobile work with encrypted documents from the company network on iOS and Android. Mobile clients for the encryption solution Conpal LAN Crypt. Process corporate documents securely on smartphones and tablets - this is made possible by the enterprise encryption solution Conpal LAN Crypt with its new mobile clients. They can be used by employees on iOS and Android devices to work with encrypted files from the company network. The protection of the data remains persistent, no matter how it reaches the device: via email, via cloud storage such as OneDrive or Dropbox, via another app or via a direct connection….

Read more