News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Protecting Servers from Cyber ​​Attacks: Free Best Practices E-Book
Protecting Servers from Cyber ​​Attacks: Free Best Practices E-Book Server Access Security

Delinea publishes free e-book “Conversational Server Access Security” with valuable best practices for “protecting servers from cyber attacks”. Delinea, a leading provider of Privileged Access Management (PAM) solutions for seamless security, is releasing “Conversational Server Access Security”, a new free e-book that offers companies valuable best practices for securing hybrid infrastructures. The guide, published in cooperation with Conversational Geek, shows how to successfully implement a Zero Trust approach to sustainably reduce cyber risks. Servers are always targeted Servers are the heart of the IT infrastructure and are often targeted by cybercriminals…

Read more

Mandiant expands XDR platform
Mandiant expands XDR platform

The new XDR solution, based on threat intelligence, helps companies to defend their digital assets, their supply chains and their brand against persistent cyber attacks. It also extends Mandiant Advantage's cross-vendor XDR platform. Mandiant, the leader in dynamic cyber defense and incident response, launches a new digital risk protection solution. This leverages Mandiant Advantage's cross-vendor XDR platform to provide a threat-intelligence-driven view of an organization's global attack surface and business-related activities across the deep web and dark web. The solution combines multiple modules from Mandiant...

Read more

DNS-based protection for telcos and ISPs
Eset_News

ESET NetProtect: DNS-based protection offers real value for mobile operators and ISPs - Internet providers. The security solution, specially tailored for telcos and ISPs, protects customers at the push of a button in domestic and mobile networks. The European IT security manufacturer ESET has released a new product range for mobile network operators and Internet providers (Telco and ISP) to offer users even more comprehensive protection. Cybercrime is and will remain an ongoing problem, as ESET researchers also show in their latest threat report. Digital attacks are increasing every day and smartphones are currently particularly affected. The ESET NetProtect solution, specially tailored for telcos and ISPs...

Read more

GDPR compliance also protects against ransomware damage
B2B Cyber ​​Security ShortNews

What were those times back in 2018, when the entry into force of the GDPR caused the greatest possible excitement in business and IT. Well, a realization after 4 years with GDPR: GDPR compliance also protects against ransomware damage. In the meantime, tempers have calmed down significantly in this regard and we had to experience a pandemic and a war of aggression in Europe. To make a long story short: Those who were GDPR compliant from the start were better able to deal with these enormous crises because they have already given their most valuable assets, their data, the necessary attention and have everything necessary…

Read more

Cloud Service: Ransomware with data isolation and recovery
Cloud Service: Ransomware with data isolation and recovery

Cohesity FortKnox, available now, is a powerful defense against ransomware with data isolation and recovery as a service via the cloud. The Cohesity-managed service strengthens cyber resiliency by storing an immutable copy of data in a cloud vault. The FortKnox SaaS solution expands Cohesity's existing Data Management as a Service portfolio with offerings that run on Amazon Web Services (AWS). FortKnox is a modern data isolation solution and can significantly minimize the impact of cyber attacks such as ransomware. It is designed to provide an additional layer of offsite protection. At the same time, it simplifies the operation...

Read more

Test: protection products for Android mobile solutions 
AV TEST News

The AV-TEST laboratory has again examined and evaluated protection apps for Android devices. In addition to three solutions for the endpoint area, 16 other license products were also examined, which can often also be found on company devices in a BYOD strategy. The AV-TEST Institute tested 19 security solutions for Android in March and April 2022. All apps and services were examined in realistic tests in the areas of protection, speed (performance), usability (usability) and other functions (features). Protection solutions for corporate devices running Android The following 3 solutions for endpoint devices running Android were tested for corporate users: Dr.Web…

Read more

Protection against supply chain attacks in SMEs 
Protection against supply chain attacks in SMEs

Attacks on the supply chain - the supply chain - for software (and for hardware) from IT also threaten small and medium-sized companies. Updates for services and software represent an increasingly dangerous vulnerability, especially since cybercriminals hope that hijacking an update will spread the attacks to numerous victims. In addition to upgrading their cyber defenses, small and medium-sized businesses should also review their supply chains for sourcing software, hardware, and updates. Unfortunately, attacks on the supply chain are often effective An attack on the IT supply chain aims to disrupt the production process…

Read more

Salesforce introduces mandatory multi-factor authentication (MFA).
B2B Cyber ​​Security ShortNews

Salesforce made multi-factor authentication (MFA) mandatory on February 1, 2022. Customers are thus required by the new user agreements to use MFA when accessing Salesforce products. With this, Salesforce is responding to the constantly growing threat landscape in which trust, integrity and availability of customer data are increasingly essential for companies to survive. No Access Without MFA The types of cyberattacks that are crippling businesses and harming consumers are on the rise. In addition, companies are increasingly relying on remote working environments. This makes it even more important to implement tighter security measures - without compromising the user experience...

Read more

After home office: Management of mobile devices in companies 
After home office: Management of mobile devices in companies

As a result of the pandemic, IT administrators around the world have faced numerous new challenges. The rapid shift to remote working has brought with it entirely new security risks and threats that were previously unthought of. Many mobile devices are now returning to the office. Companies should have a good strategy for this. 5 Mobile Device Management Best Practices from Beyond Identity. Now it's time to review mobile device management practices. While many companies are bringing their employees back into the office, a significant number of them continue to be completely...

Read more

Varonis: Improved Microsoft 365 protection for more effective ransomware detection 
Varonis: Improved Microsoft 365 protection for more effective ransomware detection

Varonis brings new capabilities to reduce data exposure to Microsoft 365. New version reduces Microsoft 365 explosion radius, enables more effective ransomware detection, and reduces collaboration risks. The new version 8.6 of the Varonis data security platform improves data security when using Microsoft 365 with clear tools for identifying at-risk files and folders with access rights that are too broad, new threat models for defending against ransomware and automatic labeling of sensitive files. New version of data security platform The Varonis data security platform puts data at the center of protection measures, thereby helping companies…

Read more