News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

NIS2 is just around the corner
NIS2 is just around the corner

In a few months, numerous companies will have to implement the NIS2 directive. The new EU directive requires strict measures to be implemented to ensure cybersecurity. At first glance, this period of time may seem long enough, but building an adequate security structure does not happen overnight. NTT Ltd., a leading IT infrastructure and services company, clears up misconceptions surrounding the NIS2 Directive and shows the best way to implement it. ​The NIS2 Directive is an EU-wide network and information security legislation that came into force on January 16, 2023 and has been adopted by member states…

Read more

SASE: Secure Access Service Edge
SASE: Secure Access Service Edge

As corporate networks grow, so do security requirements. It is no longer enough to set up security barriers in the central data center. The solution is called SASE. Instead, organizations must secure all external endpoints in their IT landscape. This includes devices used by employees in the home office, but also workstations in branches or cloud applications. The solution for providing security features where they should be effective - i.e. at the edge - is called SASE (Secure Access Service Edge). SASE combines the functions of a decentralized network with security services from the cloud and is virtually a must…

Read more

Zero Trust principles: More security in the cloud
Zero Trust principles: More security in the cloud

Access to corporate networks is traditionally based on trust. This method is anything but secure. Security experts advise introducing a security infrastructure based on the Zero Trust principles. Companies are quite open about distributing permissions and access to their corporate networks to all employees. But now that more and more organizations are moving their applications and workloads from on-premises data centers to the cloud, the potential for unauthorized access, such as hackers, is growing. In the context of network modernization, the time is ripe for a security infrastructure based on the zero trust principle, believes NTT Ltd. and advises the following steps for implementation: 1….

Read more

This is how employees do not become an insider threat

Cyber ​​criminals are increasingly using phishing campaigns to attack cloud offerings such as Office 365. A compromised account belonging to an insider is worth its weight in gold for them, as it not only allows them to read emails, but also access connected services – and launch further attacks. NTT Ltd. explains how businesses should respond to the threat of phishing. With several million active company users every day, cloud offerings such as Office 365 are becoming increasingly attractive for cybercriminals: They can use the attack techniques and tools developed for several attack targets, i.e. companies. In addition, because of the abundance of data, cloud accounts and the services associated with them are…

Read more