News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Google Cloud: Data analysis to identify attack patterns
Google Cloud: Data analysis to identify attack patterns

NTT DATA partners with Google Cloud for more cyber security. Organizations can privately retain, analyze, and search logs from security and network components, and applications that generate them, to identify attack patterns and trigger automated responses. This collaboration concerns the Chronicle Security Operations Suite with Chronicle SIEM (Security Information and Event Management) as well as Chronicle SOAR (Security Orchestration, Automation and Response) and VirusTotal, which is built and developed as a specialized layer on top of the core infrastructure of Google Cloud. Data analysis can detect attacks NTT DATA also offers this as a Managed Security Service Provider (MSSP)...

Read more

Study Identity Security: Still neglected technology
Study Identity Security: Still neglected technology

SailPoint presents The Horizons of Identity study, which examines the maturity of identity programs in organizations. New data shows that despite the growing threat of identity-based attacks, nearly half of organizations are just beginning to embrace identity security. SailPoint Technologies Holdings, Inc., the leader in enterprise identity security, today announced the findings of a new research report titled "The Horizons of Identity." At a time when hyper-innovation and rapid technology development have become the engine for global businesses, mature identity programs are becoming a…

Read more

Mind the (Air) Gap
Mind the (Air) Gap

The reliable backup, organization and archiving of your company data must have top priority. In times of cyber war, phishing and ransomware attacks, data backup plays a crucial role. An excellent protection against data theft or misuse is air gap (or air gapping). We explain why air gaps are essential for reliable and cost-effective backup. In short, an air gap means physical isolation from other computers, intranets, or the Internet by transporting a storage medium. The basic concept of an air gap is simple: if data can't be accessed, then it can't...

Read more

Zero trust in APIs in a connected business world
Zero trust in APIs in a connected business world

In the digital economy, where data streams and customer centricity determine the business processes of companies, APIs occupy a crucial position. They provide access to relevant data, systems and software components. However, this also makes them an interesting target for hackers. Time for zero trust in APIs. Hackers try to steal data such as names, account numbers, email and physical addresses by attacking APIs and API traffic. However, by their nature, securing APIs and integrating them into a Zero Trust strategy poses several challenges for organizations that a…

Read more

EDR without NDR with weaknesses in protection
EDR without NDR with weaknesses in protection

The Swiss security company Exeon Analytics warns against only relying on conventional EDR solutions (Endpoint Detection & Response) when securing endpoints. Because the agent software does not always run at the end point, which creates weaknesses in the defense network. Many endpoints in modern, hybrid networks do not support the agents required for this, and where such agents are running, they can be undermined and deactivated by sophisticated attacks. Also, because of the trend towards working from home and BYOD (Bring Your Own Device), IT and security teams often don't have access to privately owned endpoints...

Read more

Enhanced protection for Amazon Web Services (AWS) customers
Bitdefender technologies support the AWS service Amazon GuardDuty for advanced threat detection, helping to detect malware, zero-day attacks, malicious activity and other cybersecurity threats.

Bitdefender technologies support the AWS service Amazon GuardDuty for advanced threat detection, helping to detect malware, zero-day attacks, malicious activity and other cybersecurity threats. Bitdefender today announced that its antimalware technologies now support Amazon GuardDuty. Amazon GuardDuty is a threat detection service that monitors malicious activity and anomalous behavior to protect Amazon Web Services (AWS) accounts, workloads, and data. Better Protection for AWS Customers Bitdefender's antimalware technology offers AWS customers an advanced threat detection capability, identifying known and unknown malware, zero-day attacks and malicious activity. If…

Read more

Managed Service Providers as Trojan Horses
Managed Service Providers as Trojan Horses

Warnings to managed service providers to keep their IT protection up to date and to introduce new security guidelines are piling up. More recently, government regulators, including those in the UK and US, have reported an increase in malicious cyber activity explicitly targeting managed service providers. This is a development that will continue. A comment from Kay-Uwe-Wirtz, Regional Account Director Barracuda MSP. The reason for this is obvious, given that MSPs have direct access to their customers' networks and applications. Criminals who have successfully compromised an MSP using their infrastructure as a starting point are in the…

Read more

New Apple security feature: lockdown mode 

Apple has announced a new protection mechanism for particularly exposed users. Lockdown Mode promises a high level of security for specific users who, because of their person or work, may be personally targeted by sophisticated digital threats. The NSO Group (Pegasus Spyware) and other private companies involved in the development of government-sponsored spyware often undetected threaten a small target group of important or high-level users. Therefore, Apple offers a new security mode: Enabling lockdown mode in iOS 16, iPadOS 16 and macOS Ventura further strengthens device defenses and restricts…

Read more

Protect backups easily and effectively against ransomware
Protect backups easily and effectively against ransomware

Backups serve to protect against data loss. If an original is lost, you still have a copy to be on the safe side, as a “backup”. Backing up data could be that easy in a world free of ransomware and natural disasters. But nowadays IT managers have to think a lot more. FAST LTA shows you what a secure, reliable and affordable backup strategy looks like. Ransomware changes the focus of data protection from backup to recovery. Ransomware encrypts user data so that access is no longer possible. The result: IT stands still, which leads to high costs due to failure, recovery and the…

Read more

Test: protection for mobile Android devices
AV TEST News

The AV-TEST Institute tested 21 security solutions for Android in May and June 2022. The lab examined both enterprise endpoint apps and consumer apps. In addition, the laboratory examined the performance of the standard protection Google Play Protect. All Android apps and services were examined in realistic tests in the areas of protection, speed (performance), usability (usability) and other functions (features). The lab divided the tests into enterprise and consumer products. The laboratory awards up to 6 points for each of the three test areas. The best products can…

Read more