News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

NDR plus endpoint detection and response
NDR plus endpoint detection and response

Vendor ForeNova is expanding its Network Detection and Response (NDR) protection and an Endpoint Detection and Response (EDR) solution. This is intended to better protect the network in connection with the endpoints. ForeNova now offers NovaGuard, an Endpoint Detection and Response (EDR) solution. NovaGuard supplements the network traffic-based detection and defense against threats by the NDR protection NovaCommand by protecting the endpoints. NovaGuard shares its information with NovaCommand and network security specialist ForeNova's managed detection and response services. Additional protection for the endpoint Endpoint protection opens up an additional…

Read more

Managed NDR services to analyze network traffic
Managed NDR services to analyze network traffic

ForeNova expands its NDR protection with three new managed detection and response services for analyzing network traffic, such as for emergencies or for security analyst reports. ForeNova, provider of Network Detection and Response (NDR) solutions and services, is expanding its Managed Detection and Response (MDR) offering with three new services. With ForeNova TA, certified ForeNova security experts provide a one-time security posture assessment based on traffic across the network. With ForeNova IR (Incident Response), the experts support companies in analyzing and blocking malware during an attack. SME: Managed NDR for analysis As part of ForeNova Managed NDR…

Read more

Network traffic: Analysis by AI and security experts
Network traffic: Analysis by AI and security experts

There are two types of cyberattacks: Automated opportunistic attempts to penetrate a network and targeted Advanced Persistent Threat (APT) attacks. The former are in the majority and artificial intelligence (AI) can automatically block most of them. But behind an APT there are often people. Defending against such network-level attacks requires both AI and security experts. The hackers show up first through the traces of their malware in the network. However, these anomalous traffic patterns are easily lost in the mass of information. Left to their own devices, the human IT manager is overwhelmed when...

Read more

Is it an attack on IoT? – six analysis tips!
Is it an attack on IoT? – six analysis tips!

Hardware connected to the Internet of Things (IoT) can receive and forward not only data but also commands or malware code under external control. Existing sensors must not be blind spots in IT security. Six tips for detecting and analyzing attacks from the Internet of Things. IT security managers need defense methods that can detect, analyze and ward off an attack, for example via an IP camera or other sensors. Anyone who sees the resulting network traffic can block attacks at an early stage or quickly contain them in an emergency. Network Detection and Response (NDR) is a part…

Read more

A dangerous situation requires a broader perspective
A dangerous situation requires a broader perspective

Four cyber security trends for 2022. The expanded threat situation requires a broader perspective: ransomware payments or resource theft for cryptomining, sabotage, espionage or vandalism. A comment by Thomas Krause, Regional Director DACH at ForeNova. At the end of 4, Log2021j once again made it clear how easy an attack can be for hackers. You only need to exploit existing and emerging vulnerabilities to gain widespread malicious control. The attackers may be pursuing well-known motives: quick money by paying ransoms or stealing resources for cryptomining, sabotage, espionage or vandalism. Nevertheless, new challenges arise for all those responsible for IT security. Four trends...

Read more

Log4j alarm: this is what IT security experts recommend 
Log4j Log4shell

IT security experts comment on the log4j security gap for which the BSI has declared the warning level red. Experts from Barracuda Networks, Radar Cyber ​​Security and ForeNova provide an assessment of the situation. Jonathan Tanner, Senior Security Researcher at Barracuda Networks How can companies identify this vulnerability in their technology and what are the risks if it is not addressed? “First you should check whether a version of log4j prior to 2.15.0 is being used, including the dependencies. Both Maven and Gradle - both Java-based build management tools - offer the option of creating the entire dependency tree for ...

Read more

Infographic explains network detection and response
B2B Cyber ​​Security ShortNews

New infographic explains NDR: Network Detection and Response. Even for small and medium-sized companies, more security is within reach thanks to comprehensive monitoring of all data traffic in the network. Companies and organizations are never defenseless against even sophisticated and innovative cyber attacks. Threats reveal themselves in network traffic. At some point in their chain of attacks, hackers have to examine systems, install malware, move data and open communication paths that do not fit the typical pattern of an organization. Against manipulation in your own network The instrument with which cybersecurity specialists analyze data traffic in order to uncover attacks ...

Read more

Free initial scan of the IT network with NDR solution 
B2B Cyber ​​Security ShortNews

New ransomware blueprint service from ForeNova offers a free initial scan of the IT network with the network detection and response solution NovaCommand for small and medium-sized companies. With its new blueprint service, ForeNova is now offering small and medium-sized companies a free initial scan and an analysis of the vulnerabilities that an IT network offers and that attackers could exploit for ransomware attacks. ForeNova uses the technology and functions of its network detection and response solution NovaCommand for this analysis. 2-week scan gives a clear picture of security After a two-week scan of their network traffic, companies get a picture of their attack surface and vulnerabilities that they offer hackers for a ransomware attack. In addition to…

Read more

SANS Institute examines Forenova’s NDR platform NovaCommand
B2B Cyber ​​Security ShortNews

The renowned SANS Institute has examined the possibilities of the Network Detection and Response (NDR) platform NovaCommand from Forenova. A comment from Matt Bromiley, SANS Digital Forensics and Incidence Response Training Expert and Leader. NovaCommand detects and combats attacks at the network level. The solution also offers small and medium-sized companies a highly visualized 360-degree view of all data traffic and ensures sophisticated anomaly detection. The solution reduces possible damage for small and medium-sized companies - for example from ransomware or hacked IoT devices - through early, automated reactions to attacks and ...

Read more

How SMEs benefit from network detection and response

Advanced cybercrime technology that has been used in large companies for years is now within reach for smaller companies: Network Detection and Response. Protecting yourself in the current cybercrime storm is a challenge for small and medium-sized businesses that often have limited budgets and resources. The threats are developing faster than the existing cyber security solutions, and small IT departments cannot keep up. Ransomware can hit anyone Ransomware attacks are ubiquitous, but the threat landscape doesn't stop there: advanced persistent threats, insider threats and attacks on the supply chain are among the many ...

Read more