News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

For businesses: Browsers with identity-based protection
For businesses: Browsers with identity-based protection MS - AI

Now it's available: The CyberArk Secure Browser for companies. It is the first browser to offer greater security and privacy with identity-based protection, combining both with a familiar, productive user experience. The CyberArk Secure Browser relies on intelligent permission controls and can be easily deployed on a variety of devices. It was developed specifically for a cloud-first world and enables secure access to on-premises resources and SaaS applications. The browser provides security teams with unparalleled visibility, control and governance, helping to prevent the misuse of compromised identities, devices and credentials...

Read more

Finance: Many identity-related security breaches 
Finance: Many identity-related security breaches

Identity-related security breaches are on the rise in financial services, according to the SailPoint study: a staggering 93 percent of respondents said they had been compromised in the past two years. SailPoint Technologies has published the study “The state of identity security 2023: A spotlight on financial services”. The research highlights the need for better identity security in the financial services industry and shows that while more financial service providers are emphasizing identity security, attacks on corporate security remain commonplace. For example, 93 percent of those surveyed stated that they...

Read more

Why hackers are bombarding users with MFA requests
Why hackers are bombarding users with MFA requests

MFA Prompt Bombing is an effective attack method used by attackers to gain access to a system protected by Multi-Factor Authentication (MFA). The attacker sends a large number of MFA approval requests to a user in order to overwhelm them with the requests. One wrong click and an attacker has access. Regardless of the level of MFA Prompt Bombing harassment, the goal is for the user to accept the MFA request and grant access to accounts or provide a way to run malicious code on a targeted system. The security industry views MFA prompt bombing attacks as a…

Read more

The Metaverse demands a new level of cyber and data security
The Metaverse demands a new level of cyber and data security

Even if the topic “Metaverse or Metaversum” is still acknowledged with a shrug of the shoulders in many places, especially in Europe, its development is picking up speed, especially in the USA. The Metaverse requires an evolution in cybersecurity. The well-known tech giants in particular are investing billions to turn the trend concept into a (virtual) reality. In addition to many opportunities, this new space also brings with it quite a few challenges ... one of which is cyber and data security. Cyber ​​attacks are also a reality in the Metaverse The Metaverse is a new reality and a platform that offers both opportunities and…

Read more

$2,4 billion damage: When the wrong CEO requests money
$2,4 billion damage: When the wrong CEO requests money

According to the FBI, CEO fraud is the most costly online scam, with fraudsters causing a total of $2021 billion in damage in 2,4. Here, a scammer requests a high referral from a company employee through the CEO's channels or with the identity. ESET shows how companies can get a grip on the threat. When it comes to IT security, people are usually the weakest link in the chain - this also applies to social engineering, a form of phishing. CEO fraud, a variant of social engineering, has caused more damage to victims in 2021 than…

Read more

Identity Threats: New Identity Threat Protection

CrowdStrike, a leading provider of cloud-based protection for endpoints, workloads, identity and data, has introduced Falcon Identity Threat Protection Complete, the industry's first fully managed identity threat protection solution. It brings together the Falcon Identity Threat Protection module and Falcon Complete managed service to prevent identity threats, enforce IT policies and provide professional management, monitoring and remediation. Protecting Identity and Credentials With the rise of remote working, identity is becoming the focus of attackers, who are increasingly targeting credentials to infiltrate an organization. According to the...

Read more

Expert opinions on European digital identity - EUid
Expert opinions on European digital identity - EUid

Experts from various security and data protection companies give their assessments of the EUid proposal recently presented by the EU Commission. Here are the opinions of the experts from ForgeRock, Onfido and Startpage on the proposal of the EU Commission. Last week, the European Commission presented a framework for a European digital identity (EUid) that should be available to all citizens, residents and businesses in the EU by September 2022. Proof of identity with a click of a cell phone EU citizens should then be able to prove their identity securely with one click on their cell phone. The transfer of documents in electronic form should work without any problems and ...

Read more

Zero Trust against identity fraud

Due to increased remote work, IT administrators, security teams and regular employees are currently heavily dependent on remote access to corporate systems, DevOps environments and applications. This means that threat actors have a much larger attack surface at their disposal: identity fraud. Digital identities have proven to be the weapon of choice for cyber criminals. If privileged users of a company routinely use shared privileged accounts for access - especially remotely via a VPN - any attacker who compromises these credentials has, in the worst case scenario, extensive access to company-critical data and resources. In addition, not only are ...

Read more

Security risk from identity sprawl

Security risk from identity sprawl. As companies increasingly use new technologies such as the cloud, big data, DevOps, containers or microservices, this growing complexity also poses new challenges for identity and access management. With these emerging technologies, workloads and data volumes grow and increasingly reside in the cloud. This increases the number of human and machine identities exponentially. In order to contain these new attack surfaces, it is therefore essential to centralize fragmented identities across a hybrid company infrastructure and to enforce a consistent security model for privileged access. Identity Sprawl: The Dangers of Identity Sprawl With Identity Sprawl ...

Read more