News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Global Threat Report shows rise in ransomware
Global Threat Report shows rise in ransomware

New CrowdStrike Global Threats Report Shows Rise in Ransomware and Disruptive Operations. The report shows that attackers are using “lock-and-leak” operations and cloud service providers are increasingly being targeted by Russia-affiliated cyber actors. CrowdStrike Holdings, Inc., a leading provider of cloud-based protection for endpoints, workloads, identity and data, announces the release of the 2022 CrowdStrike Global Threat Report. Among other things, the report not only reveals an 82 percent increase in ransomware-related data leaks, but also introduces two completely new groups of nation-state attackers, WOLF (Turkey) and OCELOT (Colombia). In addition, the experts add to the list…

Read more

Cloud Native Application Security Platform - Tenable.cs 
Tenable news

Tenable, the Cyber ​​Exposure company, today announced new capabilities for Tenable.cs, its cloud-native application security platform. Tenable.cs provides full lifecycle cloud-native security to address cyber risks from development to runtime. With the new functions, companies can secure cloud resources, container images and cloud assets and thus ensure end-to-end security - from code to the cloud to individual workloads. Find Cloud Infrastructure Misconfigurations Tenable.cs enables organizations to programmatically detect cloud infrastructure misconfigurations in the design, build, and runtime phases of the Software Development Lifecycle (SDLC)…

Read more

The Firewall Metamorphosis: Infrastructures in the Cloud
The Firewall Metamorphosis: Infrastructures in the Cloud

More and more companies are moving resources and infrastructure to the cloud. In view of this development, conventional firewalls are reaching their limits. Hybrid work and network security must be combined: the firewall metamorphosis. A comment by Michael Veit, Technology Evangelist at Sophos. The current evolution of the modern workplace suggests that both traditional and cloud environments are merging into a world where hybrid security infrastructure use cases will dominate the future of network security. This is where SASE approaches can offer the highest level of flexibility for companies to interact on both sides of the spectrum and…

Read more

First encyclopedia for cloud risks
B2B Cyber ​​Security ShortNews

Continuously updated information source for cloud security best practices. Orca Security launches industry-first cloud risk encyclopedia. Cloud Security Innovator opens its collection of 900+ covered cloud risks along with targeted remediation strategies to share industry knowledge. Orca Security, the innovation leader in cloud security, today released the Orca Cloud Risk Encyclopedia, which serves as a global resource for practitioners and researchers throughout the InfoSec community. The rapid adoption of clouds, the increasing complexity of multi-cloud, and the shortage of cloud security professionals have all contributed to widening the cloud security knowledge gap….

Read more

Multi-cloud security and compliance
Multi-cloud security and compliance

Companies are increasingly relocating their operations not just to one, but in many cases to several public clouds. In HashiCorp's recent State of the Cloud Strategy Survey, 76 percent of respondents said they already have multi-cloud strategies in place. Another 47 percent of these respondents agreed that security is a key barrier to the cloud. Orca Security identifies challenges and best practices. Multi-cloud strategies further complicate cloud security and compliance by requiring controls and policies to be applied consistently across multiple cloud environments. By following a set of best practices, security teams can…

Read more

SSE, SASE or CASB? The Right Security Approach
SSE, SASE or CASB? The Right Security Approach

The pandemic is forcing companies to change their IT workflow and to resort to techniques that they have not yet dealt with much. It is important to understand terms such as SSE, SASE or CASB and to use the techniques correctly. The past 18 months has prompted many companies to adopt public cloud services as lockdowns have lured them into work-from-anywhere cultures. As a result, they have been forced to accelerate the deployment of cloud technologies to enable short-term distributed work while maintaining productivity and business agility. In retrospect, the turn may seem...

Read more

Cloud: The biggest cybercrime trends of 2022
Cloud: The biggest cybercrime trends of 2022

Ransomware-as-a-Service and personalized spear phishing will primarily affect the manufacturing industry and SMBs. Cloud solutions provider Zix Corporation identifies the top cybercrime trends of 2022. Zix Corporation, a leading provider of cloud solutions for email security, productivity and compliance, draws attention to the top three cybercrime trends of 2022. Cyber ​​attacks will increase in terms of methods and attackers - the focus is on ransomware-as-a-service and personalized phishing. Small and medium-sized enterprises (SMEs) and especially the manufacturing sector will be particularly affected. Trend: Ransomware-as-a-Service Under Covid-19, cybercriminals have quickly adapted to the pandemic conditions: They use the…

Read more

Cloud management platform Nebula: More protection for WLAN clients
B2B Cyber ​​Security ShortNews

Zyxel integrates 4G and 5G routers into its Nebula cloud management platform. Always-on connectivity with 5G. In addition to access points, switches and firewalls, cellular routers can now also be managed centrally. Advanced features to protect wireless clients. Zyxel Networks, a leading provider of secure business and home networking solutions, enables 5G connectivity with its Nebula cloud networking solution and extends its security capabilities to access points and wireless clients. 5G mobile network is becoming important In addition to fiber optic and DSL connections, the 5G mobile network in particular is becoming increasingly important. With Zyxel routers, customers can take advantage of an always online workplace, a mobile 'ad hoc network' or even a backup cellular connection...

Read more

Cloud apps ship two-thirds of malware downloads

Google Drive takes over the top spot for malware downloads from Microsoft OneDrive. More than two-thirds of malware downloads came from cloud apps in 2021. Malicious Office documents almost double in size. More than two-thirds of malware downloads in 2021 will come from cloud apps. Google Drive was identified as the app with the most malware downloads, replacing Microsoft OneDrive. In addition, the proportion of malicious Office documents in malware downloads doubled from 19 to 37 percent in the past year. The Netskope Threat Labs came to these conclusions in their current report Cloud and…

Read more

Account lifecycle governance on multi-cloud environments
B2B Cyber ​​Security ShortNews

With Account Lifecycle Manager, it is now possible to discover, provision and manage service accounts for all major cloud providers - Microsoft Azure, Amazon Web Services and Google Cloud Platform - from a central, policy-based solution. ThycoticCentrify, a leading provider of cloud identity security solutions formed from the merger of two leaders in Privileged Access Management (PAM), Thycotic and Centrify, announces an extension of its industry-leading Account Lifecycle Manager (ALM) service account governance solution. This release enables organizations to take control of their growing number of privileged service accounts and provides full lifecycle management in…

Read more