News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Protect identities with intelligent authorization controls
Protect identities with intelligent authorization controls

The number of human and non-human identities in organizations is growing rapidly, and sooner or later each of these identities will need access to critical resources. This makes them extremely attractive to cybercriminals. The days when only a few administrators had extensive permissions in company IT infrastructures are long gone. Most employees, applications and devices now also require such rights in order to access critical resources that they need in their everyday work. The classic definition of privileged identities therefore no longer applies, because ultimately every identity can be privileged and requires…

Read more

Secure machine identities
B2B Cyber ​​Security ShortNews

A German IT security manufacturer releases the new version of the TrustManagementAppliance. The PKI and key management solution provides certificate lifecycle management capabilities. A completely revised and redesigned user interface makes operation more intuitive and easier. Guided dialogs and wizards, for example, make it easier to create and manage certificates. This is particularly beneficial for administrators who only need to access the platform, which usually runs in the background, occasionally. Further innovations include additional programming interfaces for connecting third-party systems, a self-service portal for users and expanded options for connecting to external CAs (Certificate Authorities...

Read more

Protecting identities and access
Protecting identities and access

A European cybersecurity provider and identity and access management expert, announces the launch of its SaaS platform, Wallix One. The platform includes the essential solutions companies need to protect their digital activities. This means that employees, external service providers, IT administrators, PLC maintenance personnel or machines and robots only receive access to IT or OT infrastructures, devices, applications and data after their identity and the rights granted to them have been verified. Outsourcing the management of identity and access security solutions to Wallix One offers IT security managers several advantages: control over access to important company resources, reduction of the risks associated with identity theft…

Read more

AI threatens cybersecurity
B2B Cyber ​​Security ShortNews

With the help of AI, cyber threats are taking on a new form. Criminals use this to target identities and bypass authentication mechanisms. These are all new AI attack vectors. Artificial intelligence (AI) is impacting modern society at an unprecedented pace. ChatGPT and other generative AI tools offer many advantages, but they can also be used by attackers and thus cause a lot of damage. CyberArk Labs has now examined this evolving threat landscape to better understand what new AI attack vectors mean for identity security programs and to help develop new defense strategies...

Read more

Web 3.0 offers new attack surfaces
Web 3.0 offers new attack surfaces

The emergence of Web 3.0 came at a time when the world was changing fundamentally. At a time when people were told to stay at home and limit personal contact, life had to go on. Business had to continue as usual, contracts had to be concluded and money transferred. Web 3.0 became an opportunity for companies to tap into the digital future. Today, everything can and is done digitally, and while the benefits are clear, new risks and challenges have emerged. With the transition…

Read more

Accomplice AI: Theft of identity data 
Accomplice AI: Theft of identity data - Image by Eric Blanton from Pixabay

Identity data has always been one of cybercriminals' favorite loot. With their help, account compromises can be initiated and identity fraud committed. Now ChatGPT & Co are also helping with perfect phishing emails. A statement from Dirk Decker, Regional Sales Director DACH & EMEA South at Ping Identity. The attackers usually use social engineering and phishing. The success rate of such attacks, mostly based on sheer mass, is limited. Individualized emails and messages tailored to a victim offer significantly higher success rates, but also require significantly more work...

Read more

Identity-related risks are increasing
Identity-related risks are increasing

The new global study "2023 Identity Security Threat Landscape" shows that identity-based cybersecurity risks continue to rise. The reasons for this are, on the one hand, the difficult economic conditions and, on the other hand, the pace of technological innovation, including the dynamic development of artificial intelligence (AI). Businesses continue to drive digital and cloud initiatives. Failure to invest adequately in cybersecurity will quickly result in a larger, unsecured, identity-centric attack surface. CyberArk's Identity Security Threat Landscape Report takes stock. Developments in Germany Almost all respondents (99%) expect an increase in identity-related risks...

Read more

Security risk stolen identities
Security risk stolen identities

Compromised digital identities and user accounts represent one of the biggest cybersecurity risks for companies - this is the key finding of the Identity Breach Report 2023. A total of 1,5 billion records were stolen in this way worldwide in 2022, with an average loss for companies of 9,4, $XNUMX million per case. The situation is developing in a critical direction for many companies and industries for two reasons: On the one hand, attackers can use the stolen identities, user accounts and data as a springboard for further attacks. In addition, threat actors are increasingly using artificial intelligence for their attacks...

Read more

Focus on identities
Focus on identities

A new approach to IT security focuses on identities. In recent years, more and more companies have switched to hybrid and decentralized work environments. With this shift, IT teams have learned that they can't trust the network like they used to. Employees now have direct access to their company's resources over the Internet, bypassing traditional security tools such as virtual private networks (VPNs) and firewalls. The shift isn’t just limited to the network—remote working has proven that anyone, anywhere, with anyone…

Read more

Security platform: protection of identities
Security platform: protection of identities

At its CyberArk Impact 2022 security conference, CyberArk unveiled several innovations that take identity protection to a new level. The extensions relate to privileged access management, identity management, cloud security and secrets management - and thus support companies in the implementation of zero trust strategies. Companies face major challenges. On the one hand, they must minimize the security threats associated with increasing cloud use and adoption of SaaS and the resulting increase in the number of identities. On the other hand, defensive measures need to be strengthened in order to be able to face increasingly sophisticated attack scenarios...

Read more