News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

security certification FIPS 140-3 Level 3
B2B Cyber ​​Security ShortNews

A specialist in hardware-encrypted USB drives and the central USB drive management SafeConsole, is represented with several storage devices on the FIPS 140-3 Modules-In-Process list of the US standardization authority NIST (National Institute of Standards and Technology). The manufacturer is thus once again underlining its pioneering role in the field of highly secure USB storage media. The external hard drive DL4 FE, the USB stick Sentry 5 and the microSSD drive Sentry K350 have passed all tests for the FIPS 140-3 Level 3 certification. DataLocker has initially received the 90B certification for the storage devices, which relates, among other things, to the generation of random numbers and the use of secure entropy sources...

Read more

PQC encryption: Post-Quantum Cryptography Standards
PQC encryption: Post-Quantum Cryptography Standards

Almost two months ago, the National Institute of Standards and Technology (NIST) presented a first draft on a topic that will keep cyber security managers of all companies worldwide busy in the coming years and decades. Its title: Transition to Post-Quantum Cryptography (PQC) Standards. Its core message: Many currently approved quantum computer-vulnerable encryption systems, such as RSA, ECDSA, EdDSA, DH and ECDH, will be classified as obsolete by NIST from 2030 and will no longer be approved from 2035. Encryption systems are used in practically all sensitive and vulnerable areas of a company today: to secure the data in use...

Read more

Three Steps to Quantum-Safe Encryption (PQC)
Three Steps to Quantum-Safe Encryption (PQC)

A few weeks ago, the US National Institute of Standards and Technology (NIST) finalized the first three – of a total of four – post-quantum crypto algorithms (PQC). With the Federal Information Processing Standards (FIPS) 203, 204 and 205, companies now have the opportunity for the first time to set up their encryption processes in such a way that they are demonstrably quantum-safe – i.e. they will not be able to be broken even in a post-quantum world (PQC). Security officers, IT and security teams will now have to quickly begin converting the encryption of their systems to quantum-safe processes. The scope of the work to be done should not be underestimated. Easy…

Read more

End-to-end framework protects against data loss
End-to-end framework protects against data loss

Proofpoint and certified partners introduce their customers to a NIST-aligned, end-to-end framework that helps develop, implement and optimize data loss prevention (DLP) programs. Although DLP programs and technologies are becoming increasingly sophisticated, only 38% of organizations believe they have a "mature" DLP program. Organizations with complex requirements are looking for more comprehensive solutions that go beyond traditional DLP measures. Until now, the industry has lacked a practical framework that covers the challenges of implementing a DLP program in a rapidly evolving, multi-channel risk situation. Framework supports NIST requirements Proofpoint's framework aligns...

Read more

NIST standards for quantum security
B2B Cyber ​​Security ShortNews

The publication of the post-quantum standards by the National Institute of Standards and Technology (NIST) marks a critical step forward in securing the digital future. Until now, developers and security teams have been in a wait-and-see position, but with the finalization of these standards, the road to quantum security is now beginning. One of the biggest challenges will be to accurately identify the use of machine identities, such as TLS certificates and code signing certificates. With thousands or even hundreds of thousands of certificates in use, it is essential to update these applications and issue new certificates in accordance with the new standards.

Read more

Cyber ​​Defense Platform strengthens cyber defense
Cyber ​​Defense Platform strengthens cyber defense

A new Cyber ​​Defense Platform protects corporate networks by using AI to detect and defend against external and internal threats, helping security teams do their jobs in a cost-effective way. BlueVoyant, a cybersecurity company that illuminates, validates and reduces internal and external risks, today announced the launch of its innovative Cyber ​​Defense Platform. The platform integrates internal, supply chain and external defense solutions into a single, cloud-native platform designed to measure and strengthen cyber defenses in a cost-effective way. Diverse external threats The task of security teams has evolved from protecting the...

Read more

Implement NIST draft to protect the software supply chain
Implement NIST draft to protect the software supply chain

Software development and DevSecOps pipelines are popular targets for hackers. The NIST frameworks can help protect them better. "The way software is developed is constantly evolving, with new methods increasing the efficiency of the development process. Software architecture is also evolving so that much of the software can be built from reusable standard components," said Tom Molden, CIO Global Executive Engagement at Tanium. Adapting control systems for software "Think of it like building a prefab house, where the standard parts are built in a factory with far greater efficiency and quality...

Read more

New security regulations for IoT
B2B Cyber ​​Security ShortNews

More and more devices are connected to the Internet, not only in the private sector, but also in industry. This makes production more efficient and increasingly automated, which saves costs and labor. The Internet of Things (IoT - Internet of Things) is therefore spreading rapidly and the number of connected devices is increasing significantly. But with the growing reliance on IoT devices, the need for strong cyber security measures has become even more pressing. The legislators have recognized this. To protect the important data stored on these devices, governments on…

Read more