News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Test: Endpoint security for MacOS systems
AV TEST News

The laboratory of the independent AV-TEST Institute examined 3 endpoint solutions for MacOS systems and 7 single-user versions. The results are consistently very good and did a good job of warding off the dangers in the test. In June 2024, the AV-TEST Institute tested a total of 3 endpoint solutions for MacOS systems and 7 single-user versions. The products were examined in the areas of protection, system load (performance) and user-friendliness (usability). Top scores for endpoint solutions The laboratory awarded up to 6 points for each area. The best score was therefore 18 points. All three endpoint solutions examined achieved this top score. Bitdefender Endpoint Security…

Read more

Test: 17 protection solutions for Windows 11 clients
B2B Cyber ​​Security ShortNews

Global competition, espionage and global tensions are leading to a rising tide of cyberattacks. The AV-TEST laboratory has investigated how well endpoint security solutions protect. 17 solutions were tested under Windows 11. Companies must be well equipped in the area of ​​cybersecurity in order to filter and eliminate the large amounts of digital malware from their communications. The test of 17 protection solutions for Windows 11 clients for companies shows how well they are defending themselves against potential attackers. 17 endpoint solutions tested In March and April, the experts in the AV-TEST laboratory…

Read more

Advanced Unified Endpoint Management (UEM) solution
Advanced Unified Endpoint Management (UEM) solution - Image by svetjekolem on Pixabay

The Unified Endpoint Management (UEM) solution from baramundi has received numerous enhancements. These include password management options, secure connections through Per-App VPN and further development for recording end user feedback in Argus Experience. With this release, Argus Experience now has the functionality to record end user feedback directly. In addition to other new device data, IT admins also have the option of continuously requesting direct feedback from employees about their IT environment. This provides a holistic view of the managed work environments and IT admins can proactively and specifically identify and resolve potential incidents before a ticket is opened. Per-App VPN…

Read more

Cybersecurity platform with protection for 5G environments
Cybersecurity platform with protection for 5G environments AI- Bing

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting enterprises' ever-expanding attack surface, including securing 5G deployments. In the coming years, private 5G networks will cover a wide range of facilities, from corporate campuses to smart factories to shopping malls. However, they also pose new risks arising from complex network function virtualization (NFV), challenges in information technology and operational technology (IT/OT) convergence, unprotected IoT devices, and new implementations of 5G communications technology (CT). Covering Expanded Attack Surfaces Such a large attack surface requires holistic security across IT, OT and CT environments to manage...

Read more

Ransomware attacks: via remote device into the network
Ransomware attacks: via remote device into the network - AI

Successful ransomware groups are increasingly switching to remote encryption, according to Sophos' latest CryptoGuard report. The problem: traditional anti-ransomware protection does not “see” the disaster coming and is ineffective. The type of attack has increased by 62 percent. Sophos has published its new report “CryptoGuard: An Asymmetric Approach to the Ransomware Battle” with the evaluations of its CryptoGuard defense technology. The most successful and active ransomware groups such as Akira, ALPHV/BlackCat, LockBit, Royal or Black Basta are consciously switching to remote encryption for their attacks. With this so-called “remote ransomware”, cybercriminals use a compromised and often poorly protected device to steal data on other…

Read more

Integrated Cloud Risk Management and XDR 
Integrated Cloud Risk Management and XDR

Trend Micro is expanding its protection by expanding its cybersecurity platform to include Cloud Risk Management and XDR. With this, companies can consolidate their cybersecurity landscape and gain a complete overview of cloud security risks in hybrid IT environments. Although resilient security requires an understanding of the risks across all systems and applications that form the attack surface, only 9 percent of organizations actively monitor them. Digital transformation and cloud migration have significantly increased the attack surface of organizations. As a result, enterprises and governments have adopted isolated security technologies for on-premises and multi-cloud environments, including AWS, Azure, GCP,…

Read more

Test: Endpoint solutions under Windows 11
AV TEST News

In September and October 2023, the AV-TEST Institute tested a total of 17 security solutions for companies and 17 packages for individual workstations under Windows 11 for their protective effect, system load and usability. Some products cannot withstand all attacks in the test. The experts at AV-TEST examined 17 security solutions for companies in the laboratory. It was tested to see how well they stand up to malware. Each individual program had to fend off nearly 20.000 real malware attacks, taking into account all protection features such as URL/web filtering, behavior-based detection and heuristics in the test against zero-day threats and common malware. In the counter-check, over…

Read more

AMTD: Pioneering modern IT security
AMTD: Pioneering modern IT security

Automated Moving Target Defense (AMTD) improves application security at Sophos Endpoint by creating threat-agnostic barriers for every process. It becomes more difficult for software to execute code that is not an original part of the application. This particularly prevents malware from executing. As cyber threats intensify, security teams are dealing with an increasing number of alerts and false positives. This affects security efficiency and ties up a lot of resources. Automated Moving Target Defense (AMTD), a new concept developed and promoted by Gartner, aims to break this dynamic and provide relief. Security products…

Read more

Test: 33 protection solutions against data stealers and ransomware
AV TEST News

The independent test laboratory AV-TEST tested 33 protection solutions in defense tests against data stealers and ransomware. The products for companies and individual workstations consistently demonstrate strong defense performance against specific threats. The list of attacked companies, universities, colleges or institutions such as hospitals and administrations in the media is getting longer and longer. Classic protection products or company solutions must combine all of their protection technologies to defend against cyber attacks. The Advanced Threat Protection test shows how well they do this in 10 real attack scenarios. In the current test, the protection solutions have to defend the Windows systems against data stealers and ransomware...

Read more

Zero-trust remote access solution for secure hybrid working
Zero-trust remote access solution for secure hybrid working - image by Franz Bachinger on Pixabay

The new LANCOM Trusted Access Client enables secure and scalable network access for employees in the office, at home or on the go, thereby protecting modern hybrid working from anywhere and at any time. Through complete integration into the LANCOM Management Cloud, commissioning and configuration are “zero-touch” for easy and quick rollout of new remote access connections. The LANCOM Trusted Access solution dynamically adapts to increasing security requirements. Zero trust from SMEs to enterprises LANCOM Trusted Access supports both classic full network access as a VPN client as well as the migration to a zero trust security architecture with...

Read more