News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cloud bursting vulnerability
B2B Cyber ​​Security ShortNews

As an application delivery technique, cloud bursting enables the best of both worlds to be combined. On the one hand, it allows running an application in a private data center, with known, fixed investment costs, complete control over the environments and organizational expertise to run them. On the other hand, it is used in a public cloud that is available on demand and has almost unlimited resources. This means you only pay for additional resources when you need them. In short, cloud bursting is a hybrid cloud delivery model that is similar to pay-as-you-go...

Read more

Container images: 87 percent with high-risk vulnerabilities
Container images: 87 percent with high-risk vulnerabilities

According to the Sysdig study, 87 percent of container images are said to have high-risk vulnerabilities. The 2023 Cloud-Native Security and Usage Report finds massive risk in the supply chain, along with more than $10 million in wasteful spending on large-scale cloud deployments. Sysdig, the leader in cloud and container security, announces the results of the "Sysdig 2023 Cloud-Native Security and Usage Report". The report, which focuses on two themes this year, shows that supply chain risk and readiness to implement a Zero Trust architecture are the top unresolved security issues in cloud and container environments...

Read more

Resilience for uninterrupted cloud operations
Resilience for uninterrupted cloud operations

Resilience capabilities for uninterrupted cloud operations: Zscaler Resilience extends the flexibility of the cloud platform and keeps each app connected for rapid recovery from unforeseen events or attacks. Zscaler announces Zscaler ResilienceTM, a service that brings new capabilities to extend the resiliency of Zscaler's architecture and operations, keeping users and devices connected to critical cloud-based applications. Built on the world's largest inline cloud security platform, these industry-first SSE capabilities enable rapid response to black swan events and keep customers running. App…

Read more

Cloud: fix security risks with one click
B2B Cyber ​​Security ShortNews

One-click cloud misconfiguration fix is ​​a critical enabler for Data Security Posture Management (DSPM). Varonis Introduces Automated Posture Management to Remediate Cloud Security Risks. The new automated posture management from Varonis, the specialists in data-centric cybersecurity, helps companies to easily remediate security and compliance gaps in their SaaS and IaaS environments: Varonis continuously scans, detects and prioritizes cloud security risks and provides CISOs, Security and compliance officers real-time insight into their data security posture. With the new automation feature, they can now automatically fix misconfigurations in applications like Salesforce and AWS using a single…

Read more

Modernize IT infrastructure
B2B Cyber ​​Security ShortNews

During the winter holidays, Southwest Airlines, one of the US's largest and most respected airlines, was forced to cancel around 45 percent of its scheduled flights. It is likely due to outdated IT infrastructure and IT systems. Other airlines have also struggled with inclement weather and holiday traffic, but have not faced the same level of disruption. These few examples show that when companies are using an outdated, inefficient IT infrastructure, it will eventually buckle under the pressure of unexpected changes. Some companies hold on to their legacy systems because they don't see the point in doing anything...

Read more

New Fireboxes from WatchGuard
New Fireboxes from WatchGuard

WatchGuard Introduces New T-Series Fireboxes: Connectivity to the Unified Security Platform, improved hardware performance and additional features increase the protection of organizations of all types. WatchGuard Technologies today announced the availability of new T-Series Fireboxes. The T25/T25-W, T45/T45-POE/T45-W-POE and T85-POE tabletop firewall appliances are built on WatchGuard's Unified Security Platform architecture. Comprehensive security functionalities are made available via the connection to the WatchGuard Cloud – including simple configuration and administration. Organizations that are decentralized or that have to deal with numerous remote connections in day-to-day business benefit in particular. These can before the…

Read more

Cloud security according to BSI criteria: C5 attestation for Trend Micro 
Trend Micro News

Trend Micro, one of the world's leading providers of cyber security solutions, received the attestation according to the criteria of the C2023:5 standard (Cloud Computing Compliance Criteria Catalogue) in January 2020. These are based on the catalog of requirements of the Federal Office for Information Security (BSI) and have become the recognized security standard for cloud computing in Germany. The Japanese company thus offers its customers cloud security based on Software as a Service (SaaS) solutions for a modern and up-to-date level of security that meets the strict and demanding criteria of the BSI. C5: Cloud security according to BSI criteria The C5 catalog has been around since 2016. It…

Read more

New SaaS-based security solution
New SaaS-based security solution

The F5 Distributed Cloud App Infrastructure Protection (AIP) solution extends application observability and protection to cloud-native infrastructures. Built on the technology acquired with Threat Stack, AIP complements the F5 Distributed Cloud Services portfolio of cloud-native, SaaS-based services for application security and delivery. Companies of all sizes and industries are currently looking to simplify, secure and modernize application-based digital experiences. But many face the challenge of managing distributed and hybrid application infrastructures with workloads spread across on-premises, public cloud, and edge locations. This leads to enormous complexity and increases…

Read more

Nebula platform protects cloud threat vectors
Nebula platform protects cloud threat vectors

Cloud Storage Scanning (CSS) functionality is added to the Nebula threat detection and remediation platform (Endpoint Detection and Response, EDR). New Features Help Reduce Attack Vectors Easily and Effectively The Nebula real-time cyber protection platform expands with additional threat prevention capabilities specifically designed for resource-constrained organizations to reduce potential attack vectors through a simple cloud-based user interface. With the Cloud Storage Scanning (CSS) function, business-critical assets stored in the cloud can be effectively protected against malware and other digital threats. Cloud-based management of EPP and EDR The cloud-based Nebula platform…

Read more

Cloud Bot Defense for Amazon CloudFront 
Cloud Bot Defense for Amazon CloudFront

F5 is now making highly efficient, AI-driven bot protection available to AWS customers via an easy-to-deploy connector. F5 Distributed Cloud Bot Defense is a bot detection solution that Amazon CloudFront customers can now use to secure their apps. Malicious bots are everywhere - whether on websites, in sign-up forms or applications. They can cause great damage and high costs for companies. In doing so, they often bypass the protective measures installed. Learning the bots' attack patterns "With F5, we're always one step ahead because we're constantly adapting to the changing bots' attack patterns," says Kamal Kalra,…

Read more