News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cybersecurity: Automatically check connected devices
Cybersecurity: Automatically check connected devices

Suppliers and users can now easily and automatically check the cybersecurity and compliance of the software in their networked devices, machines, and systems using a platform solution in compliance with laws and regulations. Security vulnerabilities are uncovered by the platform and can then be remedied specifically. The Product Cybersecurity and Compliance Platform from cybersecurity company ONEKEY now supports the RED II (EN 303-645) standard in addition to ETSI 18031 1 and the Cyber ​​Resilience Act (CRA). This allows suppliers and users to automatically check whether the software in their networked devices, machines, and systems contains potential violations.

Read more

MSPs: Solution offers complete protection for Microsoft 365
MSPs: Solution offers complete protection for Microsoft 365

MSPs often manage Microsoft 365 security for their clients using multiple point solutions. This is inefficient and time-consuming. A leading security solutions provider now offers them an easy-to-use and cost-effective all-in-one platform that integrates XDR, email security, and security awareness training. Acronis, a global leader in cybersecurity and data protection solutions, introduces its new comprehensive Microsoft 365 protection solution for Managed Service Providers (MSPs). With Acronis Ultimate 365, MSPs can manage multiple different point solutions for cybersecurity, backup, and compliance simultaneously.

Read more

Against cyber risks: Platform for risk management
Against cyber risks: Platform for risk management - Image by WOKANDAPIX on Pixabay

Quickly identify security gaps and thus mitigate cyber risks: The new application extends Zscaler's Exposure Management solution and offers a single platform for asset risk management, prioritization, and quantification. Asset Exposure Management is a solution for enterprise asset risk management that falls into the category of Cyber ​​Asset Attack Surface Management (CAASM). This solution forms the foundation for Zscaler's comprehensive Continuous Threat Exposure Management (CTEM) offering and provides companies with an accurate inventory of their assets by consolidating and correlating data from a variety of sources. Based on this, security gaps can be quickly…

Read more

Cloud Workload Security for Container Environments
Cloud Workload Security for Container Environments - Image by Valdas Miskinis on Pixabay

Kaspersky has introduced a comprehensive update to its Kaspersky Cloud Workload Security solution. The updated version offers enhanced forensics capabilities and advanced file operation monitoring in runtime environments and orchestrators, making it an essential tool for companies managing large container environments. Seventy-eight percent of companies are using cloud-native technologies, while 78 percent plan to expand their use in the next two years. However, this presents security challenges: 43 percent of respondents report difficulty continuously identifying vulnerabilities and risks, creating potential security gaps. Optimized forensics capabilities…

Read more

RTOS: Cybersecurity testing for real-time systems
RTOS: Cybersecurity testing for real-time systems - Image by Pete Linforth on Pixabay

Real-time operating systems (RTOS) operate in billions of devices and represent potential targets for hackers because their cyber resilience has previously been difficult to verify. A new platform now enables testing. Testing real-time operating systems (RTOS) as firmware images for vulnerabilities and malicious code poses significant challenges for conventional security procedures. The Düsseldorf-based cybersecurity company ONEKEY has now further developed its Product Cybersecurity & Compliance Platform (OCP) so that this testing process is largely automated. "From Firmware to Compliance in One Place" is how the provider describes its approach to solving a problem that, given the tightening…

Read more

Threat Protection: APIs for IBM QRadar and Microsoft Sentinel
Threat Protection: APIs for IBM QRadar and Microsoft Sentinel

From now on, users of IBM QRadar SIEM and Microsoft Sentinel also have access to the extensive threat data of the ESET PROTECT platform and ESET Threat Intelligence via their own APIs. This strengthens their security architecture and optimizes the cybersecurity workflow. "The integration of ESET significantly increases the security level in organizations. It not only improves threat detection and incident response, but also enables security teams to make informed decisions more quickly. This increases the overall efficiency and quality of the processes," explains Michael Schröder, Strategic Business Development Manager at ESET. Seamless integration for complex security requirements...

Read more

Survey: Platform for network, AI and security desired
Survey: Platform for network, AI and security desired Image: Bing - AI

A survey of 200 CIOs and IT professionals shows that the majority of respondents want a central, integrated platform for networking, AI and security to increase productivity, optimize investments and protect against increasing cyber threats. The new study, entitled CIO Insights Report: Priorities and Investment Plans in the Era of Platformization, was recently published by Extreme Networks. The results show that while AI has caught the attention of the technology industry, the majority of CIOs and IT leaders are in…

Read more

SIEM strategy for modern cybersecurity
SIEM strategy for modern cybersecurity Image: Bing - AI

The threat situation in cyberspace continues to escalate. Cyber ​​criminals are acting more and more professionally. They offer ransomware kits in an affiliate model and sell stolen access data on the darknet. Spear phishing and whaling attacks on executives are continuing to increase. But there are solutions for zero trust with SIEM, SOAR and XDR solutions - or everything combined under one platform. In order to detect cyber attacks at an early stage, they need modern security technologies and fast response processes. A zero trust approach is now considered the standard for IT security. It is based on the principle of "trust no one" and requires constant checking of access. Central elements are identity and...

Read more

Content creation platforms abused for phishing attacks
B2B Cyber ​​Security ShortNews

Platforms that are often used by companies and graphic designers to collaborate and create content are being used by attackers for phishing attacks. This was discovered by threat analysts at Barracuda Networks. The corresponding content creation platforms have millions of users worldwide. Attackers use these platforms to send emails that contain legitimate-looking posts, designs and documents, but with embedded phishing links. When clicking on these links, users are redirected to fraudulent login pages or other misleading websites that aim to steal sensitive information such as login and other personal data. In one of the…

Read more

ThreatSync+ NDR for sovereign threat defense
ThreatSync+ NDR for sovereign threat defense - Image: Bing - AI

At the core of ThreatSync+ NDR is an advanced AI engine with a two-layer neural network approach. With the new offering, companies of all sizes benefit from cross-divisional visibility, alarm correlation and orchestrated defense. WatchGuard Technologies has announced the launch of ThreatSync+ NDR. The product, which can be specifically complemented by the also new WatchGuard Compliance Reporting, marks the birth of the ThreatSync+ family. ThreatSync+ NDR was developed to simplify the continuous monitoring, detection and remediation of threats using artificial intelligence (AI). This makes it easy to cut through the noise of billions of data streams...

Read more