News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

NIS-2: Why Compliance is so Important
NIS-2: Why Compliance is so Important

The NIS-2 Directive affects around 30.000 German institutions - companies that are part of the critical infrastructure as well as companies that are classified as "particularly important" and "important". The directive supports them in proactively ensuring greater cybersecurity in the company. For many German companies, 2024 was challenging in terms of their cybersecurity: according to the report of the Federal Office for Information Security (BSI), the aggressiveness and sophistication with which cyber criminals operate has increased considerably. The frequency and complexity of ransomware attacks have increased sharply. In view of this...

Read more

BYOD: 4 tips to minimize security risks
BYOD: 4 tips to minimize security risks

BYOD (Bring Your Own Device) means that employees in companies are allowed to use their personal devices for work. This can result in security risks because personal devices are not as tightly secured as company devices. There are four measures that can be taken to increase BYOD security. Many companies today often allow their employees to use their personal devices for work, a practice known as BYOD (Bring Your Own Device). BYOD offers flexibility and convenience, but also poses security risks because personal devices do not have the same strict protection measures as company hardware....

Read more

Securely manage business applications with AI technology
Securely manage business applications with AI technology

A provider of cybersecurity solutions is launching the latest version of its security management platform. Modern AI technology enables business applications to be identified quickly and precisely. This enables them to be clearly visualized and assigned in order to identify potential security risks even in complex hybrid environments. The new version of the AlgoSec platform enables users to precisely identify business applications running in complex hybrid networks and to use smart change management tools to make changes to the security architecture more efficiently, thus improving the security and flexibility of company processes. "Corporate security experts are now inundated with warning messages, often without differentiating between...

Read more

Free tool: Identify vulnerabilities in your network
B2B Cyber ​​Security ShortNews

A new, free tool helps IT security professionals identify and close network vulnerabilities from the perspective of cyber attackers. The tool also contributes to employee training. KnowBe4's free BreachSim tool enables IT security professionals and network administrators to uncover vulnerabilities in companies' security infrastructure and highlights the importance of employee training. The tool detects how data is exfiltrated and helps uncover network vulnerabilities. Using this information, companies can take the necessary measures to strengthen their cybersecurity and train their employees to create a strong human firewall...

Read more

First two-tier cloud security solution
First two-tier cloud security solution

A new, two-tier cloud security solution reduces critical vulnerabilities in cloud environments and improves network security by comprehensively covering over 150 cloud network risks. AlgoSec, a global leader in cybersecurity solutions, is launching a new version of its innovative Prevasio Cloud Security platform. The new solution is the first two-tier cloud security solution of its kind, representing a paradigm shift in cloud network security and offering comprehensive protection in a continuously changing cyber threat landscape. Network security is becoming increasingly complex Network security is the foundation of every cloud environment. As more companies migrate to the cloud, the complexity of network security is also increasing -...

Read more

Cybersecurity: Protection from the BIOS level
Cybersecurity: Protection from the BIOS level

Software secures all end devices and critical security applications on company PCs from the BIOS level and is practically indestructible. 28 of the world's leading PC manufacturers have already integrated the firmware into 600 million PCs. Remote and hybrid working models are making it increasingly difficult for companies to maintain overview and control of all company PCs. The complexity is affecting the effectiveness of security controls for end devices and network access. In addition, artificial intelligence and other innovations are forcing companies to accelerate new deployments and upgrades of millions of devices. The modern digital landscape is being shaped by increasingly advanced...

Read more

Cyber ​​threats in Germany – a review and outlook
Cyber ​​threats in Germany - a review and outlook

Phishing attacks, ransomware attacks, AI-powered malware – cyber threats are becoming more sophisticated and increasing. A study examined how German companies dealt with this in 2023 and what they plan for 2024. The software assessment platform Capterra publishes a study on IT security and shows how the situation of cyber threats developed in 2023. As part of the study, 1.314 employees were surveyed about how companies react to cyber threats and how they strengthen their ability to defend themselves. AI-powered attacks and email phishing attacks are at the top Cyber ​​threats from AI-powered attacks (47%) and new methods of email phishing (46%) are...

Read more

Networks: Cybersecurity through transparency
Network: Cybersecurity through transparency

The new platform "Visibility Without Borders" is designed to secure networked work in companies and increase performance. Provider NETSCOUT promises companies more transparency in network traffic and data structures. NETSCOUT has introduced its platform Visibility Without Borders (VWB for short), which provides companies with a uniform data framework for the areas of performance, availability and security to maintain their flow of goods and services. This is done by proactively identifying complex, vulnerable and risky areas and enables detailed insights, thereby increasing transparency, improving agility and securing company data and applications. Smart Data Real-time metadata that comes from...

Read more

New Fireboxes from WatchGuard
New Fireboxes from WatchGuard

WatchGuard Introduces New T-Series Fireboxes: Connectivity to the Unified Security Platform, improved hardware performance and additional features increase the protection of organizations of all types. WatchGuard Technologies today announced the availability of new T-Series Fireboxes. The T25/T25-W, T45/T45-POE/T45-W-POE and T85-POE tabletop firewall appliances are built on WatchGuard's Unified Security Platform architecture. Comprehensive security functionalities are made available via the connection to the WatchGuard Cloud – including simple configuration and administration. Organizations that are decentralized or that have to deal with numerous remote connections in day-to-day business benefit in particular. These can before the…

Read more

Desktop Firewall: Entry-Level Firewall UF-60 LTE
B2B Cyber ​​Security ShortNews

The German network infrastructure and security supplier LANCOM Systems rounds off its range of desktop firewalls. Like its sister model, the UF-60, the LANCOM R&S®Unified Firewall UF-60 LTE is the entry-level model in the portfolio. The special feature: With the additionally integrated LTE Advanced Modem, the UF-60 LTE can be operated as a backup for wired access or as a high-performance primary access with WAN uplink via LTE. It already offers cyber security with a top-class LTE modem for small companies, branch offices or home offices: from full Unified Threat Management (UTM) to the latest cyber security technologies such as sandboxing and machine learning. High level of security functions The…

Read more