News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​risks in the software supply chain
Cyber ​​risks in the software supply chain

Log4Shell or Solarwinds are typical examples of attacks on companies through their software supply chain. It is characteristic that cybercriminals do not gain direct access to the target company, but attack via a back door. A comment from Trend Micro. If you look back at some recent attacks (esp. Solarwinds or Log4Shell), you will notice that they are playing more and more "over gangs". This means that the attackers no longer attack target companies directly, but via their (software) supply chain. Whether victims are attacked via compromised Solarwinds updates or vulnerabilities in Log4Shell - in both...

Read more

Survey: Cybercrime is one of the biggest threats in 2022
B2B Cyber ​​Security ShortNews

According to a survey of 900 C-level executives, technology risks and cybercrime will be among the most important issues for their companies in 2022. This is the result of a survey by Diligent. The continuing threat of cybercrime is a serious concern for organizations, according to a recent survey of 900 C-level executives by corporate governance platform provider Diligent. Respondents identified technology and cyber risk as one of the top challenges their organization is facing this year. Three out of ten top executives surveyed also indicated that their organization had been affected by cybercrime in the last 18 months. 30 percent of…

Read more

IoT and 5G: opportunities and risks for companies 
IoT and 5G: opportunities and risks for companies

Numerous companies are in the midst of digital change, which is also being driven to a large extent by the Internet of Things (IoT). However, IoT devices still have major security weaknesses, leaving organizations exposed to new cyber threats every day. Additionally, new technologies such as 5G have made IoT devices even more vulnerable to zero-day exploits and software tampering. So, with the spread of IoT, what can organizations do to protect against such attacks? A comment by Sunil Ravi, Chief Security Architect Versa Networks. IoT devices are a security risk Telecom giant Ericsson estimates it will…

Read more

First encyclopedia for cloud risks
B2B Cyber ​​Security ShortNews

Continuously updated information source for cloud security best practices. Orca Security launches industry-first cloud risk encyclopedia. Cloud Security Innovator opens its collection of 900+ covered cloud risks along with targeted remediation strategies to share industry knowledge. Orca Security, the innovation leader in cloud security, today released the Orca Cloud Risk Encyclopedia, which serves as a global resource for practitioners and researchers throughout the InfoSec community. The rapid adoption of clouds, the increasing complexity of multi-cloud, and the shortage of cloud security professionals have all contributed to widening the cloud security knowledge gap….

Read more

Insider Threats: The Danger From Within
Insider Threats: The Danger From Within

Most companies focus on external attackers in the fight against cybercrime. But there is also a growing threat lurking within our own ranks. The IT security experts at FireEye Mandiant predict that 33 percent of all security incidents will be caused by insider threats in 2021. What can companies do to protect themselves? Legitimate access is essential - the employees have it and the attackers want it. The best security lock on the door is useless if the criminal is already in the house. Every crime fanatic knows that. The situation is similar with cyber attacks that ...

Read more

Uncover security risks in the cloud
Uncover security risks in the cloud

Uncovering Security Risks in the Cloud: Best Practices for Cloud Security Posture Management (CSPM). Many companies are now relocating their data to the cloud, but the increasing use of the cloud also increases the associated uncontrolled risks. According to a Gartner report, the majority of successful attacks on cloud services result from misconfiguration. Cloud Security Posture Management (CSPM) has therefore grown in popularity in recent years. Put simply, this technology cleans the cloud environment, warns the company of possible security risks and can fix some problems automatically. There are no additional configuration costs and the ...

Read more

Five pillars of a secure network level
Five pillars of a secure network level

The increased mobile working with the pandemic also poses major problems for network security. It has created new risks and exacerbated existing ones. With five basic principles, IT administrators can increase cyber security at this level. Several factors are currently endangering network security. Rushed home office: According to Bitdefender, in spring 2020 every second company had no plans to switch to home office overnight. This was and is all the more critical as it increased the attack surface of the company's IT. Network protocols under attack: According to Bitdefender's Business Threat Landscape Report 2020, many attacks target ...

Read more

Danger: mobile devices in healthcare
Medicine doctor mobile devices

SOTI study reveals safety concerns when using mobile devices in healthcare. 24 percent are concerned about the security of sensitive patient data on end devices. 81 percent have problems with patient care systems. One in four healthcare workers (24 percent worldwide; 39 percent in Germany) is of the opinion that patient data is not secure if they access it with their mobile device. This was the result of the global SOTI study "Critical Technology for Critical Care: The State of Mobility in Healthcare 2020/21". In addition, 81 percent (77 percent in Germany) of respondents from the healthcare sector complain about problems with systems ...

Read more

Software development creates weak points
Trend Micro News

Trend Micro introduces the application security risks and safeguards. Developers who work in traditional development teams tend to think about security after the fact because they focus too much on building applications and meeting deadlines. Applications play an integral role today and many businesses and users rely on a wide range of applications for work, education, entertainment, retail, and other purposes. Therefore, development teams play a key role in ensuring that applications provide users with a high level of usability, performance, and security from threat actors who ...

Read more