News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Impending chaos in the implementation of NIS-2
Impending chaos in the implementation of NIS-2

Analogy to NIS-2: On May 26, 2018, the General Data Protection Regulation, or GDPR for short, came into force - more precisely, the 24-month transition period ended. German companies had two years to adapt their processes to the new directive. But many only took action a few days before the deadline. You don't have to be clairvoyant to know that history will repeat itself with NIS-2. The EU member states must implement the second edition of the “Network and Information Security Directive” into national law by October 17, 2024. In Germany there is already a draft bill from...

Read more

IT security: NIS-2 makes it a top priority
IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. This is especially the case in smaller companies. The larger the company, the less often the bosses feel responsible. Whether small and medium-sized companies or corporations: In only 25 percent of German companies does the management take responsibility for IT security. This is proven by the representative study “Cybersecurity in Numbers” by G DATA CyberDefense AG, Statista and brand eins. Cyber ​​attacks on companies and institutions cause high costs and illustrate the importance of extensive IT security measures. With…

Read more

Cybercriminals: This is how they threaten companies in 2024
The new ways of cybercriminals in 2024

In 2024, cybercriminals will increasingly manipulate texts, images and voices with AI and demand increasing ransoms from companies, say the experts at G DATA CyberDefense. What cyber risks threaten companies in the coming year? According to G DATA CyberDefense, artificial intelligence (AI) is increasingly becoming a serious threat to IT security. Cybercriminals are increasingly taking advantage of the great potential of artificial intelligence and endangering IT security with fakes. Further challenges such as increasing regulatory requirements and high ransom demands make IT security even more of a Sisyphean task. Cybercriminals are using AI for more efficient…

Read more