News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Automated data inventory for data protection
Automated data inventory for data protection

The provider Exterro announces a new solution for data inventory. Exterro Smart Data Inventory helps organizations build, monitor, and maintain a reliable data protection program. The basis for this is a single smart and dynamic inventory of all internal and external data records, inventories and processing processes. To create an effective data protection and governance program, organizations need to be able to quickly get a real-time picture of the data they hold internally, but also to be able to keep track of data transfers with other stakeholders. Faced with massive amounts of data, many organizations struggle to maintain an accurate and up-to-date…

Read more

Big hurdles in GDPR compliance in companies

Data protection is becoming more and more important, while at the same time the amount of data is increasing rapidly. Without a strategic approach, companies are lost. Exterro shows how companies overcome the four major hurdles on the way to GDPR compliance. The large variety of compliance and data protection regulations alone is an enormous challenge. Companies have to comply with different regulations worldwide and even within Europe, which is made more difficult by the fact that these regulations are constantly changing. They are therefore faced with the difficult task of continuously adapting their internal processes so that they always comply with all specifications. Not doing so can have serious...

Read more

Automation of digital forensics and incident response
Automation of digital forensics and incident response

Enhanced FTK Connect increases the power and speed of FTK® solutions with new automation, integration and visualization capabilities. Exterro improves digital forensics and incident response automation with upgrades to FTK® Connect. Exterro, provider of legal GRC software that unifies e-discovery, digital forensics, privacy and cybersecurity compliance, today announces the release of its updated FTK® Connect digital forensics tool. It extends Exterro's industry-leading platform with powerful new automation, orchestration, and integration capabilities. Accelerate investigations The automation of FTK Connect enables companies to speed up the response to incidents or investigations of security breaches. On the other hand offset...

Read more

Can IT forensics protect democracy?

A democracy offers many rights and freedoms to the people who live in it. Guaranteeing and protecting this is the task of the state. Exterro explains how IT forensics can help with digital forensic examinations of data carriers, IT systems and communication links. Smartphones, computers, instant messengers and online services have changed the work of the Office for the Protection of the Constitution, police authorities and other federal and state bodies. In order to protect the free-democratic basic order and to ensure the peaceful coexistence of people, they increasingly need solutions for IT forensics. Exterro, provider of legal GRC software that enables e-discovery, digital forensics, data protection and cybersecurity compliance...

Read more

The advantages of cloud-based IT forensics
The advantages of cloud-based IT forensics

On a local computer, digital forensics are subject to strict limits; the use of cloud-based applications in the data center or with a cloud provider makes the work of the experts much easier. Exterro names the advantages of centrally running forensic solutions for companies and authorities. After cyber attacks, data protection violations or criminal offenses in which smartphones, online services and other digital tools were used, IT forensic scientists in companies and investigative authorities often have to examine enormous amounts of data and are often under time pressure. They are therefore dependent on modern tools that quickly save and evaluate data from a wide variety of sources, prepare test results clearly...

Read more

Tools for IT forensics after cyber attacks
Tools for IT forensics after cyber attacks

Cyber ​​attacks are a daily occurrence for most companies, and it is usually only a matter of time before data security is breached. That's when forensic tools come into their own, helping investigative teams investigate incidents, secure evidence, and initiate countermeasures. There is no such thing as XNUMX% protection against cyber attacks – this is proven, among other things, by the numerous reports of ransomware attacks and data breaches in the news and daily newspapers. It is therefore important for companies to prepare for emergencies and coordinate processes for…

Read more

Worldwide training academy for forensics and data protection

Exterro, provider of legal GRC software that combines e-discovery, digital forensics, data protection and cybersecurity compliance, announces the launch of its new training academy. The Academy offers a combination of one-to-one, live, and on-demand virtual training for Exterro's full range of Legal GRC products. The aim is to train companies in the implementation and use of the software and to continuously train them in the functionalities of the technology. Educating Forensics Experts The Exterro Academy aims to optimize the customer experience and enable companies to realize the full potential of Exterro solutions.

Read more

Cyber ​​security and digital forensics via artificial intelligence - AI 
Cyber ​​security and digital forensics via artificial intelligence - AI

Corporate and government compliance and risk management departments typically have many manual processes. In order to be able to keep up with the mountains of data and regulatory requirements, they are dependent on new technologies - above all with artificial intelligence - AI. Exterro, provider of legal GRC software that combines e-discovery, digital forensics, data protection and cybersecurity compliance, explains which solutions make the work of those responsible easier. Massive data protection violations, difficulties in adhering to compliance requirements after cyber attacks or uncovering serious crimes: the work of internal legal departments and investigative authorities has increased, but the human resources are not in the same...

Read more