News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

The struggle with compliance guidelines
The struggle with compliance guidelines

European companies are concerned about the future: four in five are more concerned about compliance than they were five years ago. In more than half of the cases (57%), the burden lies on the shoulders of the IT department. This was the result of the new IT compliance survey that Hornetsecurity published at Infosecurity Europe 2023, which is currently taking place in London. Necessary controls not possible Of particular concern is that 69% of those surveyed stated that adhering to compliance guidelines had a "moderate" to "extreme" impact on the operations of the respective IT department. But…

Read more

Cloud-based GravityZone Security for Mobile
Cloud-based GravityZone Security for Mobile - Photo by Maxim Ilyahov on Unsplash

Bitdefender has introduced its GravityZone Security for Mobile, an extension of the well-known security platform GravityZone that works completely cloud-based. This means that Unified Security is now also available on Android, iOS and Chromebooks. Businesses can now identify and respond to cyber threats to Android, iOS-based devices and Chromebooks as quickly as possible. End customers as well as Managed Service Providers (MSPs) also benefit from full visibility of their mobile IT infrastructure. 6,8 billion smartphones in use More than 6,8 billion smartphones are in use worldwide, many of which are also used in a business context, sometimes as "Bring Your Own...

Read more

Cloud: Sticking to passwords despite security risks
Cloud: Sticking to passwords despite security risks

A new industry study reveals that half of cloud professionals surveyed are frustrated with password hygiene requirements. But the experts want to stick to the passwords, although there are secure alternatives with MFA. A survey at Cloud Expo Europe provides information. Even most cloud professionals still cling to the use of passwords, despite their well-known security vulnerabilities, their value as a target for cybercriminals, and widespread user frustration with the complexity of proper password management. That's according to a new industry study...

Read more

Cloud Next Generation Firewall for Microsoft Azure
Cloud Next Generation Firewall for Microsoft Azure

The new cloud next-generation firewall for Microsoft Azure from Palo Alto Networks: With the help of AI and ML, known, unknown and zero-day threats can be stopped so that users can migrate their applications to Azure safely and quickly. Cloud NGFW for Azure offers a comprehensive security solution with features such as Advanced Threat Prevention, Advanced URL Filtering, WildFire and DNS Security. As an Azure-native ISV service from Palo Alto Networks, Cloud NGFW for Azure is quick and easy to source and deploy through the Azure portal. In addition, the service is fully managed by Palo Alto Networks,…

Read more

Five years GDPR
Five years GDPR

The European Union's General Data Protection Regulation is exhausting, but a success story. The European Commission should use the fifth anniversary of the GDPR to think carefully about "Privacy Shield 2.0". The GDPR celebrates its fifth anniversary. The European General Data Protection Regulation has been in force since May 25, 2020. Even if it cost those responsible a lot of nerves when it was introduced, it can still be considered a success story. For example, it has had an extremely positive effect: namely, it has raised general awareness of the problem of data protection. This was not least ensured by the many headlines about the hefty fines imposed due to…

Read more

Cloud firewall with protection for Virtual WAN
Cloud firewall with protection for Virtual WAN

A global leader in cyber security solutions announces the general availability of its industry-leading next-generation cloud firewall, factory-integrated with Microsoft Azure Virtual WAN to provide customers with best-in-class security. The integration provides advanced threat protection and layered network security across public, private, and hybrid clouds. It enables companies to migrate to Azure with maximum operational efficiency. Network-as-a-Service “Microsoft Azure Virtual WAN is a Network-as-a-Service, which provides customers with a number of benefits because this model simplifies networking, security, and routing functions to deliver scalability, cost savings, and improved…

Read more

Insecure video conferencing
B2B Cyber ​​Security ShortNews

Online meetings offer cybercriminals a good opportunity to cause enormous damage to companies. The cases of industrial espionage via video conference, hacking or data theft are increasing. Video conferencing is part of everyday life in many companies. However, companies often forget that online meetings also harbor risks, especially if they do not consider security measures. Even without much effort, companies can find out whether they are exposed to an increased risk of cyber attacks during their video conferences. Lack of access control Companies often send login links to their employees to give them access to online meetings. Login links may provide a convenient way of access, but they also make it easier for cybercriminals to…

Read more

Data breaches in the cloud
Data breaches in the cloud

A report shows rise in ransomware attacks and human error as the leading cause of data breaches in the cloud. 48% of IT professionals reported an increase in ransomware attacks, with 22% of organizations having experienced a ransomware attack in the last 12 months. 51% of organizations have no official ransomware plan Of those who have recently experienced a data breach in the cloud, 55% of respondents cited human error as the root cause. Key Findings Thales announces the release of the Thales Data Threat Report 2023, its annual report on…

Read more

Response time after alarm: 4 days and more!  
Response time after alarm: 4 days and more!

The Cloud Threat Report Volume 7 reveals: After an alert for a security team, attackers have up to 40 days to carry out their attack in 4 percent of cases. Attackers are helped by the 60 percent unpatched high or critical vulnerabilities. The cloud attack surface is as dynamic as the cloud itself. As organizations around the world increasingly share, store, and manage data in the cloud, the attack surface for businesses is expanding exponentially. This expansion often happens in unknown, overlooked, or poorly secured ways. For attackers, every workload in…

Read more

Doing Zero Trust the right way
Doing Zero Trust the right way

To combat the new risks associated with the current hybrid way of working, many cyber security executives and vendors have now discovered “Zero Trust”: This framework aims to enforce security in the IT environment while at the same time increasing the productivity of the entire company increase. The way people work has changed dramatically in the last decade. Enterprise employees today work from anywhere, using devices and networks no longer directly under their control, to access corporate resources in the cloud….

Read more