News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

MDR: Advanced Managed Detection and Response service
MDR: Advanced Managed Detection and Response service ms-KI

Cybersecurity specialist Bitdefender has presented its further developed offering for managed detection and response services. Companies and organizations can now obtain two different levels of the service: MDR and MDR PLUS are tailored to the specific needs of customers depending on the industry and place of origin or taking into account other risk factors such as the respective supply chain. Bitdefender MDR continuously monitors, detects and responds to threats. In addition, the service offers active threat hunting. Security analysts guide customers with their advice and advise them on the risk situation. Centralized management of services from a single point…

Read more

More security with MDR – Cybersecurity as a Service
More security with MDR – Cybersecurity as a Service - Image by Gerd Altmann on Pixabay

NDR – Network Detection & Response is now considered a security technology in IT security that should not be missing from any company network. But who evaluates all the data and leads the response? The magic word here is MDR – Managed Detection and Response Services. An interview with Michael Veit, security expert at Sophos. Effective security solutions include technological components such as networked endpoint protection, a next generation firewall, both paired with artificial intelligence and human expertise in the form of security services. While classic security solutions can detect and ward off a large number of attacks and malicious anomalies, it has long...

Read more

IT security industry: Germany's best hacker 2023
B2B Cyber ​​Security ShortNews

Even if the word hacker has negative connotations, the competition "Germany's Best Hacker 2023" is not. The cybersecurity industry is looking for young talent through competitions, where pupils, students or career changers can prove what they can do. In a few days, the competition Germany's Best Hacker 2023 will start and is looking for the best security experts for tomorrow. In 2020, the first competition started to find the best hackers in the region, to promote them and to guide them in the right direction. Since 2022, this mission has been extended to all of Germany...

Read more

Cloud: Sticking to passwords despite security risks
Cloud: Sticking to passwords despite security risks

A new industry study reveals that half of cloud professionals surveyed are frustrated with password hygiene requirements. But the experts want to stick to the passwords, although there are secure alternatives with MFA. A survey at Cloud Expo Europe provides information. Even most cloud professionals still cling to the use of passwords, despite their well-known security vulnerabilities, their value as a target for cybercriminals, and widespread user frustration with the complexity of proper password management. That's according to a new industry study...

Read more

MXDR: With AI and expert knowledge against hackers
MXDR: With AI and expert knowledge against hackers

AI-based risk analysis and human expert knowledge: Ontinue presents its Managed Extended Detection and Response (MXDR) and explains which three typical problems companies can solve by working with a security partner. Endpoint detection and response was yesterday. Today, companies show their attackers the MXDR rake and work closely with specialized service providers to do this. They use their know-how to implement an expanded security concept that is based on the teamwork of everyone involved and AI-based monitoring of all entry points. A security concept for all entry points The external experts are expanding the proven automated detection of and reaction to…

Read more

Proactive Incident Response for SaaS
Proactive Incident Response for SaaS

With the introduction of Proactive Incident Response, Varonis improves the data security of its customers. As part of the SaaS offering, a team of experienced analysts monitors suspicious activity on the customer side, investigates alerts and notifies security officers. With this new service, Varonis significantly reduces the pressure on security teams and improves their ability to prevent data breaches. In addition to providing tactical support in incident response, threat hunting, and alert prioritization, Varonis security experts also provide strategic advice, adapt threat models, and implement preventive actions to continuously improve customers' data security...

Read more

AI in the SOC - the new measure of things
AI in SOC - the new measure of things

The SOC will also change massively through the use of AI. With an AI enhancement that distills the knowledge of a global "crowd" of SOC analysts from security workflows and then turns them into a kind of co-pilot. An assessment by Joshua Saxe, Chief Scientist and AI expert at Sophos. Today, there are two types of user-centric software products: products that use machine learning and automation to adapt to and achieve user goals, and products that are disruptive and require carefully memorized and repetitive interactions. Google Search, Siri and...

Read more

Webinar May 04, 2022: Why fileless malware is so dangerous
Kaspersky_news

Kaspersky invites you to a free webinar on May 04, 2022 from 10:30 a.m. on the topic "Cyber ​​attacks with a screwdriver - why fileless malware is so dangerous". Experts explain how fileless malware accesses existing tools or legitimate applications. Fileless attacks have long become an integral part of cybercriminals' repertoire. The reason for this is simple: known malware can now be reliably identified by traditional detection mechanisms. The situation is different with fileless malware, because it uses existing tools or legitimate applications and is therefore not suitable for conventional security solutions.

Read more

Ransomware attack: pay or not pay?

The worst-case scenario: A ransomware can successfully spread in a company and encrypt data on PCs and drives. After that, a ransom demand is displayed on the screen. How should a company make decisions after a ransomware attack? Security experts give advice. Comments from Kaspersky, G Data, Sophos, Trend Micro, Bitdefender, AV-TEST, Bitglass, Digital Guardian, Fore Nova, Radar Cyber ​​Security, Barracuda Networks. It usually takes only seconds: a file is opened, sometimes a script is executed, the ransomware executes and immediately starts spreading in the corporate network. In many companys there are for this…

Read more

Every second employee wants more IT security in the company
G Data News

G DATA study shows: Employees must become an elementary part of a holistic IT security concept. IT security should have a higher priority in companies. That is the opinion of almost 75 percent of the people with a higher level of IT security expertise who were surveyed for the current survey "Cybersecurity in Figures" by G DATA CyberDefense in cooperation with Statista. "Security on the Internet" plays a central role in Germany - both privately and professionally. This is confirmed by a current survey by G DATA CyberDefense in cooperation with Statista. However, the study “Cybersecurity in…

Read more