News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Outlook 2025: Solutions for changing attack surfaces through AI, IoT & Co
Outlook 2025: Solutions for changing attack surfaces through AI, IoT & Co -Image: Bing - AI

The attack surface of enterprises will inevitably continue to expand in 2025. The data-driven acceleration, including the increasing integration of AI-driven applications and IoT devices, will expose new vulnerabilities. This will allow malicious actors to expand their actions and strategies. Executives will grapple with increasing regulatory pressure and try to balance innovation and compliance. While already established directives such as the EU General Data Protection Regulation (GDPR) already set strict standards for data protection and security, newer regulations such as NIS2 or DORA raise the bar even higher. For global companies…

Read more

Local Backups: Return to Safe Harbor
Local Backups: Return to Safe Harbor

Why companies are rediscovering local backup strategies: In recent years, companies have become increasingly dependent on cloud solutions - like ships that have drifted further and further away from the safe shore. While 81 percent of companies use cloud services, a strategic turnaround is now emerging: on-premises backup strategies stand tall like a steadfast lighthouse. Amid the turbulent sea of ​​cybersecurity threats and cost pressures, they show companies a safe harbor. This surprising revival of local data backup is based on a combination of robust security measures, cost efficiency and strategic control - characteristics that lead the way like a reliable...

Read more

2025: Who wants to be responsible for IT security?
Who wants to be responsible for IT security? Image: Bing - AI

As they do every year, the IT security specialists at WatchGuard Technologies have taken a look into the future at the end of 2024 and made their predictions about which trends will shape the industry in the coming months. It is obvious that things will not get any easier for IT security managers in companies - quite the opposite. One of the six theses put forward is: "The role of CISO (Chief Information Security Office) is not desirable." Typical problems that have to be overcome in this role are less of a technical nature, but mainly concern dealing with human sensitivities...

Read more

DA-CH Cyber ​​Protection: Companies feel well positioned
Cyber ​​protection: Companies feel well positioned Image: Bing - AI

According to figures from the Sophos Management Study, the growing threat of cyber attacks and the resulting potential economic consequences have prompted most companies in Germany, Austria and Switzerland to invest even more in IT security and are now satisfied with their cyber protection. As a result, most companies are satisfied with the status of their cyber protection. In Switzerland, most of those surveyed (80 percent overall) feel well (66 percent) or very well (14 percent) prepared against cyber attacks. In Austria, too, people are satisfied with their cyber protection, here it is...

Read more

IT security for everyone – free security tools
IT security for everyone - free security tools

A leading provider of connectivity cloud services is making several key security tools that are often expensive available to businesses for free, including access to its comprehensive Zero Trust platform that can automatically defend against some of the most well-known threats. One of the biggest hurdles to protecting a business is the cost of acquiring the tools needed to defend against today's sophisticated threat actors. The services required to do this have traditionally only been affordable for companies large enough to afford both the technology and the teams to implement it.

Read more

IT security: How cyber resilience changes processes
IT security: How cyber resilience changes processes

Digitalization is changing corporate cultures. More and more data is available in real time, faster and faster. But digitalization affects not only productive applications, but also data security and data backup. How can IT security be implemented and who is responsible for it? IT matter = management matter? This is not just an empty phrase, but a reality. IT is no longer just a digital desk or an extended workbench. Information and the availability of digitized processes are the basis for corporate success and are therefore central strategic components in the corporate context. At the same time, in times of increasing uncertainty and cybercriminal activities, a…

Read more

GAP analysis: Identify and close security gaps
GAP analysis: Identify and close security gaps

For more and more companies, the GAP analysis is becoming an indispensable tool for identifying and specifically resolving potential security risks. It should also be standard for small and medium-sized companies. As part of a GAP analysis, companies can evaluate their current IT security measures and identify any gaps, e.g. with regard to implemented technical and organizational measures, processes or documentation. This includes comparing the existing security protocol with industry best practices and standards (e.g. recommendations from the BSI, standards according to ISO 2700X) as well as regulatory requirements in order to get a clear picture of where...

Read more

Complex IT security: 450 end devices – 3 IT employees
Malwarebytes News

Many companies use several security solutions at the same time. This leads to a high level of complexity. Malwarebytes surveyed 50 companies in an international survey on the topic of complexity. IT departments in smaller companies often have only limited human resources. In order to be able to defend themselves against increasingly sophisticated attacks from cyber criminals - such as ransomware - many companies have invested in their security infrastructure. However, this has often increased the complexity of the IT systems - especially when different software solutions are used. On average, 3 IT employees look after 450 end devices. These are the most important results of the survey: Companies...

Read more

NIS2 Directive: Many companies are still planning
NIS2 Directive: Many companies are still planning

The NIS2 Directive is due to come into force in October of this year. So far, only a third of German companies have complied with the directive. Almost forty percent of companies have not yet taken action, but are planning to do so. 38 percent of German companies have not yet started implementing the NIS2 Directive. But it is high time: With the draft law (NIS-2 Implementation and Cyber ​​Security Strengthening Act), the Federal Ministry of the Interior and Home Affairs has set the course. The national law is due to come into force by October 17, 2024. For companies, this means...

Read more

SME: Managed security services and training
Managed security services and training for SMEs

Cyber ​​attacks are not only directed against large companies; SMEs are also often affected. There is often a lack of resources and skills for IT security there. The solution is managed security services. IT security stands as the sword of Damocles over IT managers. Why is obvious. The strong networking through IT in all areas of the company offers numerous new areas of attack. Ransomware and malware are fueling the challenge. Everyone knows someone who is affected. And it's no longer just the big companies. The danger is omnipresent and it is not a question of if you will be attacked, but when….

Read more