News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Quantum Titan: AI-powered cloud network security
Quantum Titan: AI-powered cloud network security

Check Point Quantum Titan, the new version of Check Point's cybersecurity platform, brings new aspects to IoT security and threat prevention. Release R81.20 brings faster, AI-powered network security and advanced threat prevention for on-premises, cloud, and IoT. Check Point Quantum Titan uses innovative artificial intelligence and deep learning technology to protect against the most sophisticated attacks, including zero-day phishing and domain name system exploits. The Quantum Titan security console introduces three new software blades that leverage artificial intelligence (AI) and deep learning to deliver advanced threat defenses against equally advanced...

Read more

SMEs: Do ex-employees still have access to data?
SMEs: Do ex-employees still have access to data?

Only half of the SMEs in Germany cannot rule out that ex-employees still have data access to systems in the company. When it comes to access to cloud data, only four out of ten SMEs are sure that ex-employees are locked out. Former employees can pose an additional IT security risk for medium-sized companies and SMEs in Germany, as the current Kaspersky SMB Cyber ​​Resilience Report shows. Because only 41 percent of all company managers surveyed can rule out that former employees still have access to company data stored in the cloud, and only 46 percent are sure that ex-employees...

Read more

Cloud: Data breach costs up to 28 million euros 
Cloud: Data breach costs up to 28 million euros

On average, every company that has cloud data is at financial risk of 28 million euros in the event of a data breach. This is the conclusion of the new SaaS data risk report from Varonis Systems. This examines the challenges CISOs face in protecting data in a growing portfolio of SaaS applications and services such as Microsoft 365, Box or Okta. The report highlights how hard-to-control collaboration, complex SaaS permissions, and dangerous misconfigurations (like admin accounts without multi-factor authentication/MFA) leave a significant amount of cloud data vulnerable to insider threats and cyberattacks. For the report analyzed…

Read more

Audit-proof data protection for cloud infrastructures 
Audit-proof data protection for cloud infrastructures

The patented microshard process defies current data protection concerns in relation to cloud infrastructures: data is broken down into single-digit bytes without loss of performance. These microshards are then stored in cloud environments or on on-premises servers. Generally applicable regulations such as the General Data Protection Regulation (GDPR) or industry-specific standards such as the KRITIS regulation of the BSI or the telematics infrastructure often impair corporate flexibility and agility. They go hand in hand with new investments. Corporate decision-makers are increasingly unsettled. In view of the unclear legal situation, many therefore hesitate to outsource parts of their infrastructure to a cloud infrastructure. Data protection for cloud infrastructures In addition, after…

Read more

Data protection: find sensitive data in Microsoft 365, AWS or Google
B2B Cyber ​​Security ShortNews

In addition to sensitive data, the secrets in companies also include stored information on access data, API keys or passwords on drives or in the cloud at AWS, Microsoft 365 or Google. To track down and classify these "secrets" in the corporate environment, Varonis now offers Secrets Discovery. With increasing cloud usage and ever faster app development, secrets, i.e. confidential information such as API keys or passwords, can end up almost anywhere and reveal intellectual property, source code and critical infrastructure. Accordingly, open secrets are increasingly responsible for devastating data breaches. The new data classification possibilities from Varonis Systems, Inc. the specialists...

Read more

CIO Survey on Growing Cloud Complexity
CIO Survey on Growing Cloud Complexity

A survey of 1.300 CIOs shows that growing cloud complexity is an increasing challenge for companies. The data explosion through cloud-native technology stacks exceeds human management capabilities. Only monitoring and data analysis solutions can keep track. Dynatrace, the "Software Intelligence Company," has released the results of an independent global survey of 1.303 CIOs and senior cloud and IT managers. The results show that with the increasing trend towards cloud-native architectures, the data generated in such environments exceeds the ability of current solutions to produce meaningful analytics. CIOs are finding their...

Read more

High security cloud service with universal app support
High security cloud service with universal app support

TeamDrive for iOS and Android with universal app support. The new version allows the use of any app with end-to-end encrypted collaboration via the high-security cloud service. With a new "universal version", the high-security cloud service TeamDrive can be used for the first time with any app on iPhones and iPads as well as mobile devices with Android. TeamDrive features seamless end-to-end encryption with a zero-knowledge architecture. This means that no one but the user himself has the access key to the data - not even the provider. This distinguishes TeamDrive from all US clouds whose operators are legally obliged to notify US authorities...

Read more

Cloud vulnerabilities allow access to critical data
Cloud vulnerabilities allow access to critical data

As a new Orca Security Report shows, cloud vulnerabilities allow access to critical data in just three steps: known vulnerabilities, unsecured storage resources, and failure to follow best practices allow for an average cloud attack path of just three steps to directly access an organization's crown jewels reach. Orca Security has released the 2022 State of the Public Cloud Security Report. The study provides important insights into the current state of public cloud security and shows where the most critical security gaps can be found. One of the key findings of the report is that the average attack path is just three steps...

Read more

Cloud Exchange: Accounts without MFA abused for spam
B2B Cyber ​​Security ShortNews

Microsoft reports on analyzed attacks on cloud exchange. Attackers penetrated the cloud exchange accounts using credential stuffing, known passwords from previous data breaches – all without multi-factor authentication (MFA). Then everything was set up for mass spamming via these accounts. Microsoft researchers recently investigated an attack in which malicious Open Authorization (OAuth) applications were deployed on compromised cloud tenants and then used to control Exchange Online settings and spread spam. The investigation found that the threat actor launched credential stuffing attacks against high-risk accounts that didn't have multi-factor authentication (MFA) enabled, and…

Read more

Ransomware: proactive protection in the cloud 
Ransomware: proactive protection in the cloud

The Orca Security and AWS guide outlines five key steps organizations can take to better protect against ransomware in the cloud. Businesses should use AWS Backup to create immutable backups of their most important cloud resources and run regular tests. Ransomware attacks are now also affecting cloud resources. However, the therefore indispensable ransomware prevention in the cloud is not only to detect malware, but also to continuously secure and harden the cloud environment. The aim is to prevent attackers from being able to reach their goal. Organizations must also ensure they use AWS Backup to...

Read more