News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Protection solution for KRITIS against cyber attacks
Protection solution for KRITIS against cyber attacks

The PREVENT/OT solution recognizes possible attack paths to impair the operation of critical infrastructures - KRITIS. Their novel approach uses AI to “think like attackers” and visualize pathways within IT and OT that lead to critical infrastructure. PREVENT/OT is part of the Darktrace/OT family of products. It protects complex industrial environments from known and unknown attacks. It uses self-learning AI to identify assets and detect subtle anomalies that indicate a cyber threat. Many KRITIS companies are currently using the solution in areas such as electricity, water, oil and gas, shipping and transport. Intelligence…

Read more

New endpoint security solution for SMEs 
New endpoint security solution for SMEs

Astra, the new cloud-based endpoint security solution from Zyxel Networks, offers SMEs not only classic security but also a protected environment for mobile work, as well as management and protection of all end devices via a portal. Location-independent working enables employees to connect to the company network from anywhere in order to collaborate with colleagues, partners and customers. As a result, however, SMBs now need to securely manage many more network devices than ever before. While such decentralized networks provide the flexibility employees need, they also increase the risk of cyberattacks. For medium-sized companies...

Read more

Attack detection for more cyber security in medium-sized companies
Attack detection for more cyber security in medium-sized companies

The German Cyber ​​Security Organization (DCSO) is now providing an expanded range of cyber security services as a managed service. Medium-sized companies in particular thus receive protection for their IT infrastructure from a single source around the clock. More and more small and medium-sized companies are currently being targeted by IT attacks. Because compared to large companies, they often have less sophisticated security systems and cyber know-how and therefore offer an easier target for ransomware & Co. In addition, their IT and security teams are usually not on duty around the clock. SMBs are more vulnerable to attacks…

Read more

Zero trust for cloud infrastructure underutilized
Zero trust for cloud infrastructure underutilized

As the study "Zero Trust-Transformation 2023" shows, 90 percent of global companies are already implementing or planning some form of zero trust in their cloud infrastructure, but they are not yet exploiting the full transformation potential. Zscaler releases its 2023 Zero Trust Transformation Global Study. As part of the survey, more than 90 percent of IT leaders who have already migrated to the cloud or are in the process of migrating said they have a Zero Trust security architecture in place, currently implementing or planning to implement. Cloud Infrastructure plus Zero Trust For such a massive migration…

Read more

SMEs: 75 percent fear loss of reputation after an attack
SMEs: 75 percent fear loss of reputation after an attack

Through cyber attacks on large companies and SMEs: Around 75 percent fear a loss of reputation (SMEs 74 percent) through an attack, but not even 10 percent protect their assets for this reason. This can quickly cost reputation and customer trust. The Kaspersky study shows the discrepancy: the top 3 reasons for protective measures do not match the top 3 feared effects. The most feared damage is financial impact and loss of reputation and customer trust. However, the main reasons for cybersecurity measures are to protect business continuity, data and customers. Protection reason and effects differ The main reasons for the implementation of cyber protection measures…

Read more

Cloud security: Secure access against hackers 
Cloud security: Secure access against hackers

Therefore, when a company moves its data and workloads to the cloud, it opens up significantly more avenues for hackers to penetrate. The challenge of protecting them is therefore greater than ever: In the current Cloud Security Report, 76 percent of those surveyed stated that they use two or more clouds in their everyday work. To understand how best to protect cloud assets, consider the analogy of a door. Suppose every security door consists of a number of components that fit together. All the individual parts together form the structure of each door: hinges, handles, locks,...

Read more

Google Cloud: Data analysis to identify attack patterns
Google Cloud: Data analysis to identify attack patterns

NTT DATA partners with Google Cloud for more cyber security. Organizations can privately retain, analyze, and search logs from security and network components, and applications that generate them, to identify attack patterns and trigger automated responses. This collaboration concerns the Chronicle Security Operations Suite with Chronicle SIEM (Security Information and Event Management) as well as Chronicle SOAR (Security Orchestration, Automation and Response) and VirusTotal, which is built and developed as a specialized layer on top of the core infrastructure of Google Cloud. Data analysis can detect attacks NTT DATA also offers this as a Managed Security Service Provider (MSSP)...

Read more

Study Identity Security: Still neglected technology
Study Identity Security: Still neglected technology

SailPoint presents The Horizons of Identity study, which examines the maturity of identity programs in organizations. New data shows that despite the growing threat of identity-based attacks, nearly half of organizations are just beginning to embrace identity security. SailPoint Technologies Holdings, Inc., the leader in enterprise identity security, today announced the findings of a new research report titled "The Horizons of Identity." At a time when hyper-innovation and rapid technology development have become the engine for global businesses, mature identity programs are becoming a…

Read more

Mind the (Air) Gap
Mind the (Air) Gap

The reliable backup, organization and archiving of your company data must have top priority. In times of cyber war, phishing and ransomware attacks, data backup plays a crucial role. An excellent protection against data theft or misuse is air gap (or air gapping). We explain why air gaps are essential for reliable and cost-effective backup. In short, an air gap means physical isolation from other computers, intranets, or the Internet by transporting a storage medium. The basic concept of an air gap is simple: if data can't be accessed, then it can't...

Read more

Zero trust in APIs in a connected business world
Zero trust in APIs in a connected business world

In the digital economy, where data streams and customer centricity determine the business processes of companies, APIs occupy a crucial position. They provide access to relevant data, systems and software components. However, this also makes them an interesting target for hackers. Time for zero trust in APIs. Hackers try to steal data such as names, account numbers, email and physical addresses by attacking APIs and API traffic. However, by their nature, securing APIs and integrating them into a Zero Trust strategy poses several challenges for organizations that a…

Read more