News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ivanti Expands Neurons Platform for Better Cybersecurity

Three new modules for the Ivanti Neurons platform enable secure Everywhere Workplace for better cybersecurity and contextual digital employee experiences: Patch for Microsoft Endpoint Manager, Ivanti Neurons for Risk-Based Vulnerability Management, Digital Experience Score . Ivanti, provider of the Ivanti Neurons automation platform that discovers, manages, secures and maintains IT assets from the cloud to the edge, introduces three new integrated solutions: Ivanti Neurons Patch for MEM (Microsoft Endpoint Manager), Ivanti Neurons for Risk-Based Vulnerability Management and the Digital Experience Score feature within Ivanti Neurons Workspace. With these modules, Ivanti supports its customers…

Read more

Comprehensive cybersecurity platform Trend Micro One
Trend Micro News

Trend Micro, one of the world's leading providers of cybersecurity solutions, introduces Trend Micro One, a comprehensive cybersecurity platform including a growing ecosystem of technology partners. It enables customers to better understand, manage and reduce their cyber risk. Enterprises battle a growing array of cyber risks with overburdened IT teams and siled security products. At the same time, the attack surface is becoming increasingly complex. A unified cybersecurity platform facilitates continuous risk and threat assessment and supports with attack surface detection, cyber risk analysis, and threat response and mitigation. Ongoing Risk and Threat Assessment According to Gartner, “vendors are acquiring or developing these capabilities and increasingly integrating them into a…

Read more

BSI certificate 3S in SoC – first step for cell phone e-SIM
B2B Cyber ​​Security ShortNews

The German Federal Office for Information Security (BSI) has certified the "Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile" according to Common Criteria (ISO/IEC 15408). With the certification identifier BSI-CC-PP-0117, mobile devices such as smartphones have a security platform - for example for e-SIM. The protection profile was developed by the chip manufacturers and test centers organized in the European industry association EUROSMART: Brightsight, Deutsche Telekom Security, Giesecke+Devrient, Infineon, Internet of Trust, JTSec, NXP, Qualcomm, Samsung, STMicroelectronics, Synopsys, Thales, Tiempo-Secure, TrustCB, TÜViT, Winbond and Xilinx. Secure Sub-System in a System-on-Chip It specifies requirements for secure…

Read more

Kaspersky: Threat Intelligence Platform is now free
Kaspersky: Threat Intelligence Platform is now free

Kaspersky currently offers free use of its Kaspersky Threat Intelligence Platform. While previously only the individual file or link analysis was free, the professional platform for analysis can now be used completely free of charge for threat lookup, cloud sandbox, APT, crimeware and ICS threat intelligence reporting. Kaspersky addresses users directly on its website: “We are monitoring events in and around Ukraine very closely. These are difficult and uncertain times, but protecting all of our customers from cyber threats is our top priority. We assume that the current...

Read more

Cloud Native Application Security Platform - Tenable.cs 
Tenable news

Tenable, the Cyber ​​Exposure company, today announced new capabilities for Tenable.cs, its cloud-native application security platform. Tenable.cs provides full lifecycle cloud-native security to address cyber risks from development to runtime. With the new functions, companies can secure cloud resources, container images and cloud assets and thus ensure end-to-end security - from code to the cloud to individual workloads. Find Cloud Infrastructure Misconfigurations Tenable.cs enables organizations to programmatically detect cloud infrastructure misconfigurations in the design, build, and runtime phases of the Software Development Lifecycle (SDLC)…

Read more

Cloud management platform Nebula: More protection for WLAN clients
B2B Cyber ​​Security ShortNews

Zyxel integrates 4G and 5G routers into its Nebula cloud management platform. Always-on connectivity with 5G. In addition to access points, switches and firewalls, cellular routers can now also be managed centrally. Advanced features to protect wireless clients. Zyxel Networks, a leading provider of secure business and home networking solutions, enables 5G connectivity with its Nebula cloud networking solution and extends its security capabilities to access points and wireless clients. 5G mobile network is becoming important In addition to fiber optic and DSL connections, the 5G mobile network in particular is becoming increasingly important. With Zyxel routers, customers can take advantage of an always online workplace, a mobile 'ad hoc network' or even a backup cellular connection...

Read more

AI-based XDR platform against threats
AI-based XDR platform against threats

Google Cloud and Cybereason introduce first AI-based XDR platform that collects and analyzes threat data from across the IT environment on a global scale. The XDR company Cybereason and Google Cloud announce the availability of Cybereason XDR, powered by Google Chronicle. With the Extended Detection and Response solution (XDR), defenders are able to predict and detect cyberattacks in the company and react to them at maximum speed - whether at endpoints, in networks, identities, in the cloud or in individual work environments. Powered by Google Chronicle "Together, Cybereason and Google Cloud Deliver the ...

Read more

Multi-factor authentication: multiple protection against hackers
Multi-factor authentication: multiple protection against hackers

The high number of attacks in which compromised login data are misused shows that passwords alone are no longer sufficient as a trustworthy identification of legitimate users, but that the use of multi-factor authentication (MFA) has become a fundamental building block for corporate security. MFA requires users to provide convincing proof of their identity in addition to their login credentials. According to Microsoft, MFA can prevent identity-based attacks based on stolen credentials up to 99,9 percent. Even if a user's credentials are compromised, MFA attackers make it extremely difficult to circumvent the authentication requirements. How does multi-factor authentication work? MFA complements the authentication process ...

Read more

Centralized platform for threat intelligence management
Centralized platform for threat intelligence management

To support security and response teams in companies in the detection, investigation and combating of threats and to increase the efficiency of IT security processes, Kaspersky has turned its threat intelligence fusion and analysis tool, Kaspersky CyberTrace, into a central threat intelligence -Platform expanded. The Kaspersky CyberTrace solution now includes enhanced threat intelligence platform functions. This includes, among other things, an alert triage, the analysis of threat data and the investigation of incidents. The paid version can be integrated with all common SIEM (Security Information and Event Management) solutions and security controls and offers a graphic visualization for an efficient reaction. The community version of ...

Read more

WatchGuard: Cloud platform receives endpoint security functionalities
WatchGuard: Cloud platform receives endpoint security functionalities

WatchGuard expands its cloud platform with additional endpoint security functionalities. Patch management, encryption and other features relevant to end device protection are now integrated in WatchGuard Cloud. WatchGuard Technologies is massively promoting the vision of establishing a central IT security platform. Four more endpoint security service modules have just been integrated into WatchGuard Cloud. Now the functions "WatchGuard Patch Management", "WatchGuard Full Encryption", "WatchGuard Advanced Reporting Tool (ART)" and "WatchGuard Data Control" are also available to users and partners in this way. The IT security specialist thus offers customers and partners central access for far-reaching security solutions, ranging from comprehensive endpoint protection to…

Read more