News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

EU Cyber ​​Resilience Act: Guide against risks and fines
EU Cyber ​​Resilience Act: Guide against risks and fines

The theft of data, digital blackmail, espionage and sabotage caused damage to the German economy of around 2022 billion euros in 203. The EU Commission's EU Cyber ​​Resilience Act (CRA) is a legal obligation to improve product cybersecurity across the European Union. A free guide helps to better recognize future legal obligations and to avoid possible risks and fines Cyber ​​threats are one of the biggest risks for companies and the economy as a whole and have caused enormous damage in recent months. According to the “Wirtschaftsschutz 2022” study by the industry association BITKOM, in…

Read more

Big hurdles in GDPR compliance in companies

Data protection is becoming more and more important, while at the same time the amount of data is increasing rapidly. Without a strategic approach, companies are lost. Exterro shows how companies overcome the four major hurdles on the way to GDPR compliance. The large variety of compliance and data protection regulations alone is an enormous challenge. Companies have to comply with different regulations worldwide and even within Europe, which is made more difficult by the fact that these regulations are constantly changing. They are therefore faced with the difficult task of continuously adapting their internal processes so that they always comply with all specifications. Not doing so can have serious...

Read more

Ransomware: proactive protection in the cloud 
Ransomware: proactive protection in the cloud

The Orca Security and AWS guide outlines five key steps organizations can take to better protect against ransomware in the cloud. Businesses should use AWS Backup to create immutable backups of their most important cloud resources and run regular tests. Ransomware attacks are now also affecting cloud resources. However, the therefore indispensable ransomware prevention in the cloud is not only to detect malware, but also to continuously secure and harden the cloud environment. The aim is to prevent attackers from being able to reach their goal. Organizations must also ensure they use AWS Backup to...

Read more

Threat Hunting: Five steps to a successful hunt
SophosNews

Threat hunting and an effective emergency plan increase security for companies and significantly reduce the effects of cyber attacks. After all, almost 59 percent of the companies surveyed in a Sophos study have identified an increase in the complexity of cyber attacks. In fact, in the latest State of Ransomware 2022 Report, 59 percent of the companies surveyed noticed an increase in the complexity of cyber attacks over the past year. Well over half are aware that cybercriminals are more sophisticated than ever and are increasingly using covert, human-controlled techniques in their attacks. As a result,…

Read more

Legal guidelines for IT managers and management
Trend Micro News

IT Compliance: Trend Micro publishes a new edition of its legal guide. Already in its seventh edition, this supports IT managers and management with legal information. Trend Micro presents the new edition of its legal guide. This supports companies with legal issues that need to be considered in the context of IT security. Not least due to the passing of the IT Security Act 2.0, the requirements for organizations in Germany have changed. What IT managers should consider, what challenges there are with critical infrastructures (KRITIS) and how the cloud remains secure in terms of IT compliance are core topics of the seventh...

Read more

Cloud Security Guide
Cloud Security Guide

Bundesverband IT-Sicherheit eV (TeleTrusT) publishes “Cloud Security” guidelines. Cloud computing is now a widely accepted IT operating model and is used by most companies. Many IT providers have changed their strategy to "Cloud First", some even to "Cloud Only". The threat situation has also changed: cloud platforms are increasingly in the focus of cybercrime. The secure use of cloud services is therefore a central component of the IT security of companies as a whole. The TeleTrusT guide "Cloud Security" is primarily aimed at small and medium-sized companies. It includes a systematic consideration of the risks involved in using...

Read more

Guide to cybersecurity in the Corona crisis
News B2B Cyber ​​Security

F-Secure has put together a comprehensive cybersecurity guide for the COVID-19 outbreak to help businesses secure operations during the pandemic. The coronavirus pandemic is forcing companies to change the way they work. Offices around the world are closing their doors and instructing their employees to work from home. With the rapid spread of COVID-19, some companies made drastic changes practically overnight. That is hardly enough for the IT departments to make the transition smooth and secure. There is also not enough time to develop the threat models ...

Read more