News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

EU Cyber ​​Resilience Act controversially discussed
B2B Cyber ​​Security ShortNews

The closer the Cyber ​​Resilience Act (CRA-E) comes into force, the more questions arise for manufacturers and distributors of smart devices. In the future, companies will be liable for the management of security risks - EU law provides for drastic fines, which can be due even if deadlines are missed. The CYBICS conference will take place for the eighth time on November 28, 2023 - for the second time this year it will be dedicated exclusively to the topic of cyber resilience and CRA-E. Under the motto “Compliance, security and best practices: the Cyber ​​Resilience Act”…

Read more

Strengthen resilience against cyber attacks
Strengthen resilience against cyber attacks

A leading provider of self-healing, intelligent security solutions, has announced the further expansion of its ecosystem of Absolute Application Resilience. Joint customers can now apply Absolute's firmware-embedded persistence technology to improve the resiliency of more than 80 mission-critical security and business applications. Recent additions include NetSfere, ActivTrak Agent, HP TechPulse, Dell SupportAssist, Symantec Management Agent, BUFFERZONE Safe Workspace, Octopus Pro and Syxsense Responder. Robust Security Controls With the alarming increase in cyber security risks and disruptions, there is an urgent need for robust security controls that…

Read more

Assess cyber resilience
Assess cyber resilience

Numerous cyberattacks and data breach headlines are a constant reminder to businesses that cybersecurity is fragile. The remote working model increases the burden on IT and security teams as there is no longer a well-defined network boundary. Telemetry data published in Absolute's 2023 Resilience Index shows that corporate device locations have increased by 15 percent. This means that significant amounts of employees are now working on networks that are not owned or controlled by the company, dramatically increasing the risk to an organization. Over and beyond…

Read more

Resilience for uninterrupted cloud operations
Resilience for uninterrupted cloud operations

Resilience capabilities for uninterrupted cloud operations: Zscaler Resilience extends the flexibility of the cloud platform and keeps each app connected for rapid recovery from unforeseen events or attacks. Zscaler announces Zscaler ResilienceTM, a service that brings new capabilities to extend the resiliency of Zscaler's architecture and operations, keeping users and devices connected to critical cloud-based applications. Built on the world's largest inline cloud security platform, these industry-first SSE capabilities enable rapid response to black swan events and keep customers running. App…

Read more

More resiliency with SaaS data backup
More resiliency with SaaS data backup

Over the past year, the cybersecurity world has faced many different challenges. Many companies not only had to deal with the consequences of global crises, but also experienced an increase in increasingly sophisticated cyber attacks with phishing or ransomware. Time for more resiliency with SaaS data backup. The last year has shown that in many places there is still too little investment in IT security. Although the news of successful cyber attacks, which often lead to business interruptions and data loss, is piling up, protection against such incidents does not yet seem to have the highest priority for all companies. Included…

Read more

Webinar April 21, 2022: Resilience against cyber espionage campaigns
B2B Cyber ​​Security ShortNews

Trellix invites you to the free webinar on April 21, 2022 from 14:00 p.m. “Operation Graphite – Strengthening resilience against cyber espionage campaigns”. This is how threat actors exploit trusted avenues within the organization to slowly and stealthily defeat standard security controls. Organizations are beefing up their security measures and implementing more robust authentication and network security controls, leaving attackers looking for another route to success. One such new avenue is "Operation Graphite," uncovered by the Trellix Advanced Threat Research team. In this webinar, we'll explore how threat actors are exploiting trusted enterprise avenues to slowly and stealthily defeat standard security controls,...

Read more