News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Impending chaos in the implementation of NIS-2
Impending chaos in the implementation of NIS-2

Analogy to NIS-2: On May 26, 2018, the General Data Protection Regulation, or GDPR for short, came into force - more precisely, the 24-month transition period ended. German companies had two years to adapt their processes to the new directive. But many only took action a few days before the deadline. You don't have to be clairvoyant to know that history will repeat itself with NIS-2. The EU member states must implement the second edition of the “Network and Information Security Directive” into national law by October 17, 2024. In Germany there is already a draft bill from...

Read more

Is 5G a security risk for OT?
Is 5G a security risk for OT?

5G: Until recently, OT (Operational Technology) infrastructures were designed as isolated, shielded environments, disconnected from the corporate network - with the result that cybersecurity has not received much attention. With the advancement of an ever more networked factory, the Industrial Internet of Things (IIoT) and the latest 5G mobile communications standard, companies can no longer avoid implementing security concepts for their production facilities that are equivalent to those they already do in the classic IT environment. In principle, the integration of new technologies always entails potential security risks. Private 5G is safe - isn't it?...

Read more

Zero Trust: Paradigm Shift in Cybersecurity
Zero Trust: Paradigm Shift in Cybersecurity

Never trust, always verify – the “Zero Trust” security model follows this motto. No actor wishing to access resources is trusted. Rather, each individual access requires authentication. Time for a paradigm shift in cybersecurity. A comment from Sebastian Ganschow, Director Cybersecurity Solutions at NTT Ltd. The thinking behind Zero Trust is simple: implicit trust is itself a vulnerability that attackers can exploit for lateral movement and access to sensitive data. Because the fortress – i.e. the company network – has not been impregnable for a long time. Data…

Read more