News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

AI in the SOC - the new measure of things
AI in SOC - the new measure of things

The SOC will also change massively through the use of AI. With an AI enhancement that distills the knowledge of a global "crowd" of SOC analysts from security workflows and then turns them into a kind of co-pilot. An assessment by Joshua Saxe, Chief Scientist and AI expert at Sophos. Today, there are two types of user-centric software products: products that use machine learning and automation to adapt to and achieve user goals, and products that are disruptive and require carefully memorized and repetitive interactions. Google Search, Siri and...

Read more

Network traffic: Analysis by AI and security experts
Network traffic: Analysis by AI and security experts

There are two types of cyberattacks: Automated opportunistic attempts to penetrate a network and targeted Advanced Persistent Threat (APT) attacks. The former are in the majority and artificial intelligence (AI) can automatically block most of them. But behind an APT there are often people. Defending against such network-level attacks requires both AI and security experts. The hackers show up first through the traces of their malware in the network. However, these anomalous traffic patterns are easily lost in the mass of information. Left to their own devices, the human IT manager is overwhelmed when...

Read more

Managed Service Providers as Trojan Horses
Managed Service Providers as Trojan Horses

Warnings to managed service providers to keep their IT protection up to date and to introduce new security guidelines are piling up. More recently, government regulators, including those in the UK and US, have reported an increase in malicious cyber activity explicitly targeting managed service providers. This is a development that will continue. A comment from Kay-Uwe-Wirtz, Regional Account Director Barracuda MSP. The reason for this is obvious, given that MSPs have direct access to their customers' networks and applications. Criminals who have successfully compromised an MSP using their infrastructure as a starting point are in the…

Read more

Solution for automatic DDoS attack mitigation
Solution for automatic DDoS attack mitigation

NETSCOUT announces a new solution for smarter and automated DDoS attack mitigation. An innovative approach uses global visibility and AI analytics to quickly respond to DDoS attacks and reduce operational overhead. NETSCOUT, a leading provider of cyber security, service assurance and business analytics solutions, announces the launch of a new Artificial Intelligence (AI) based solution. This allows customers to automatically and instantly block most DDoS attacks, simplifying operations and minimizing risk to their business. ATLAS Network with DDoS Monitor The solution leverages NETSCOUT's ATLAS network, an unmatched source for insight into DDOS attack activity...

Read more

The role of AI and ML in cybersecurity
The role of AI and ML in cybersecurity

The constantly increasing number of successful cyber attacks demonstrates how often attackers achieve their goals despite modern prevention solutions. As a result, the focus is increasingly on technologies that serve to quickly discover ongoing attacks - NDR (Network Detection & Response). Artificial intelligence - AI - and machine learning - ML-based systems play a major role here. However, since these terms are often mixed up and for many companies the topic of "AI & ML" is still a closed book, Andreas Riepen, Head of Central and Eastern Europe at Vectra AI, raises three fundamental questions...

Read more

Data Exploration module answers critical security questions

Arctic Wolf Security Operations Cloud now processes over two trillion security incidents per week using machine learning and artificial intelligence. New Data Exploration Module Accelerates and Simplifies Answers to Critical Security Questions Arctic Wolf, one of the world's leading security operations companies, announces the launch of Arctic Wolf Data Exploration. The new module of the Arctic Wolf Security Operations Cloud expands the possibilities of Arctic Wolf Log Search and enables customers to retrieve log data, IT processes and asset information independently using the state-of-the-art Arctic Wolf Security Operations Platform. Transparency about security-related processes Customers receive...

Read more

AI-based whitelist DNS filter
AI-based whitelist DNS filter

Dynamically learning DNS blocker stops threats in real time before they reach the network. ProSoft presents Blue Shield Umbrella: The world's first AI-based whitelist DNS filter. The Domain Name System (DNS) makes the Internet really usable for users. DNS converts website calls into IP addresses and forwards user requests to the target server. But: DNS is not encrypted and therefore a potential weak point for every computer and thus every company network. Unencrypted DNS is vulnerable There is a high risk potential, for example, from the intrusion of malware and zero-day malicious code, but also from fake websites for…

Read more

Protection against data loss: artificial intelligence vs. human vision
Protection against data loss: artificial intelligence vs. human vision

Cyber ​​security is constantly evolving as cyber criminals become more sophisticated and digital security tools accelerate risk mitigation as much as possible. Where can artificial intelligence (AI) help in terms of cyber security and where not. A comment by Fiete Marohn, VIPRE DACH. The year 2020 presented even more opportunities for hackers to strike, such as through phishing emails such as spoofing authentic PPE providers or from HMRC to copy unsuspecting victims. Recently we even saw how phishers are now using the vaccination campaign to scam people by selling them for fake…

Read more

Cloud Applications: Real-time attack detection and blocking
B2B Cyber ​​Security ShortNews

Industry-first solution that combines multicloud observability and advanced AIOps with real-time vulnerability management and mitigation. Dynatrace integrates real-time intrusion detection and blocking, enhancing cloud application security. Dynatrace, the "Software Intelligence Company", has extended the Application Security Module. It now offers real-time automatic detection and mitigation of attacks. This protects against injection attacks that exploit critical vulnerabilities such as Log4Shell. Dynatrace thus complements existing functions such as automatic detection of runtime vulnerabilities in cloud-native applications and container workloads. Now companies can protect their applications in real time and increase DevSecOps automation to ensure the security of their...

Read more

Cyber ​​security and digital forensics via artificial intelligence - AI 
Cyber ​​security and digital forensics via artificial intelligence - AI

Corporate and government compliance and risk management departments typically have many manual processes. In order to be able to keep up with the mountains of data and regulatory requirements, they are dependent on new technologies - above all with artificial intelligence - AI. Exterro, provider of legal GRC software that combines e-discovery, digital forensics, data protection and cybersecurity compliance, explains which solutions make the work of those responsible easier. Massive data protection violations, difficulties in adhering to compliance requirements after cyber attacks or uncovering serious crimes: the work of internal legal departments and investigative authorities has increased, but the human resources are not in the same...

Read more