News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

2023: Enterprises must optimize their IT defenses
2023: Enterprises must optimize their IT defenses

Cyber ​​criminals never stand still. They constantly improve their methods and intensify their attacks on available targets. In 2023, companies will once again be faced with the task of further optimizing their IT defenses. When it comes to cyber insurance, a good defense is also expected or there is no policy. 2022 was not a quiet year for IT security either. Hackers have crossed new borders: Organized criminals attacked governments, like Conti in the Costa Rica case. The Lapsus$ group attacked well-known players in the digital economy such as Microsoft, Nvidia, Uber, Globant and others. Hacker collectives developed sophisticated, powerful tools for…

Read more

Hardware & Software as a Service for OT Security
Hardware & Software as a Service for OT Security

Nozomi Networks has once again evolved the options to acquire industrial and ICS cybersecurity solutions. With OnePass™, the industry's first fully integrated hardware and software-as-a-service model for OT and IoT security, customers can tailor their solution choice to today's needs with the flexibility to adapt to tomorrow's requirements at any time . “Visibility is critical to defending facilities and assets against today's cybersecurity challenges. Security teams can't wait through lengthy investment assessments to gain the insight they need to protect operations," said Sid Snitkin, Advisory Group...

Read more

Electric cars: cyber threat to charging stations
Electric cars: cyber threat to charging stations

If the IT security of the charging stations continues to be neglected, this could slow down the progress of electric vehicles in society and offer new targets for hackers. Because these are simply other IoT devices connected to the Internet. The virtual threats of EV charging stations are becoming more and more real. This could delay the spread of electric vehicles and hamper government mandated efforts to combat climate change. The target set by the federal government is, for example, to reduce emissions from traffic by 2030 to 40 percent by 42. Meanwhile, the European Parliament is aiming for a complete ban on…

Read more

Medical facilities: 90 percent had data breach
Medical facilities: 90 percent had data breach

As a study shows: 9 out of 10 IT professionals in the healthcare industry attest to deficiencies in the security of patient data. Over 90% of healthcare facilities in Germany have already suffered a data protection incident. According to a recent study by SOTI entitled "A crucial investment: At the pulse of technology in healthcare", 91% of healthcare facilities in Germany (70% worldwide) have suffered at least one data protection incident since 2020. Still, 83% of respondents (76% globally) believe that full digitization of medical records can improve data security and reduce the risk...

Read more

Quantum Titan: AI-powered cloud network security
Quantum Titan: AI-powered cloud network security

Check Point Quantum Titan, the new version of Check Point's cybersecurity platform, brings new aspects to IoT security and threat prevention. Release R81.20 brings faster, AI-powered network security and advanced threat prevention for on-premises, cloud, and IoT. Check Point Quantum Titan uses innovative artificial intelligence and deep learning technology to protect against the most sophisticated attacks, including zero-day phishing and domain name system exploits. The Quantum Titan security console introduces three new software blades that leverage artificial intelligence (AI) and deep learning to deliver advanced threat defenses against equally advanced...

Read more

IoT security cameras: a found fodder for hackers
IoT security cameras: a found fodder for hackers

IoT security cameras are connected to both the company network and the Internet, and transmit large amounts of data to recording systems in the company or in the cloud. Implementation should be rigorously planned and ongoing monitoring implemented. Since these points are often neglected, IoT security cameras are often a target for hackers. Internet-connected security cameras can be found everywhere these days - in public institutions, businesses and even in homes. The market is estimated to be around $2021 billion in 50 and is growing rapidly. Every day, hundreds of thousands of IoT security cameras are deployed worldwide...

Read more

XIoT Report: over 50 percent more IoT vulnerabilities
XIoT Report: over 50 percent more IoT vulnerabilities

Team1's State of XIoT Security Report: 2022H 82 shows an increase in IoT vulnerabilities, vendor self-identified vulnerabilities, and fully or partially fixed firmware vulnerabilities. On average, 125 XIoT vulnerabilities are published and fixed per month. Disclosures of vulnerabilities in IoT devices increased by 2022 percent in the first half of 57 compared to the previous six months. This is shown by the new State of XIoT Security Report: 1H 2022 from Claroty, the specialist for the security of cyber-physical systems (CPS). In the same period, the manufacturers themselves…

Read more

Cyber ​​security goes far beyond classic endpoints

Cyber ​​security: IP cameras, building access solutions, sensors on assembly lines or printers connected to the web are making the front line of companies to the Internet increasingly confusing and increasing the potential for attack. Four arguments for a "security perspective" on the Internet of Things. If you want to protect yourself against hackers from the Internet of Things, you need more information and access to the IoT hardware - through extended endpoint security. This applies to all companies - especially for production and healthcare, which integrate IoT directly and very strongly into their processes. New IoT hardware due to pandemic…

Read more

Study: vulnerable IoT in medicine, production and KRITIS
Study: vulnerable IoT in medicine, production and KRITIS

IoT Security Report 2022 uncovers significant gaps in cyber security. A study reveals many vulnerable IoT systems in the areas of medicine, production and KRITIS. Business leaders should think about increasing liability. Cyber ​​security is still thought of in silos - that is the conclusion of a study by the specialist for IoT security ONEKEY. “In many cases, companies and entrepreneurs still think in classic silos when it comes to IT security. The immediately growing risk of many different firmware versions in IoT systems is often overlooked,” warns Jan Wendenburg, Managing Director of ONEKEY. Highest IoT threat in medicine To the areas…

Read more

Is it an attack on IoT? – six analysis tips!
Is it an attack on IoT? – six analysis tips!

Hardware connected to the Internet of Things (IoT) can receive and forward not only data but also commands or malware code under external control. Existing sensors must not be blind spots in IT security. Six tips for detecting and analyzing attacks from the Internet of Things. IT security managers need defense methods that can detect, analyze and ward off an attack, for example via an IP camera or other sensors. Anyone who sees the resulting network traffic can block attacks at an early stage or quickly contain them in an emergency. Network Detection and Response (NDR) is a part…

Read more