News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Five cyber defense strategies
Five cyber defense strategies

In the past two years, attackers have managed to penetrate the systems of 78 percent of German companies. This is shown by the “Data Risk Management” study by Veritas Technologies. What's particularly concerning is that AI tools like WormGPT make it easier for attackers to refine their social engineering attacks through AI-generated phishing emails. But that's not all: AI-controlled, autonomous ransomware attacks will continue to occur more frequently in 2024. Below, Veritas explains the effective methods and proven tips for defending against cyberattacks, especially with regard to ransomware. Password hacking Cybercriminals exploit security gaps and get hold of other people's passwords...

Read more

2FA for solid protection of accounts and data
B2B Cyber ​​Security ShortNews

The need to use a 2-factor authentication solution, i.e. the multi-step process for verifying an identity when logging in, is now indispensable. 2FA is one of the fundamental anchors of any defense strategy. Bitkom has just published a study that shows that two-factor authentication has not yet become established, although it massively increases security. Unfortunately, many still rely on complex passwords. Bitkom determines: Still passwords instead of 2FA Three quarters of internet users in Germany (74 percent) pay attention to complex passwords when creating them, which consist of a mix of...

Read more

AI innovation at the control level for machine identities
AI innovation at the control level for machine identities - Image by Jorge Franganillo on Pixabay

Venafi Athena enables the use of generative AI and machine learning to deliver the industry's first intelligent machine identity management capabilities. This makes machine identity management easier and faster for IT security teams. Venafi, pioneer of machine identity management, presents Venafi Athena at the 5th edition of the Machine Identity Summit. As an AI technology for the Venafi Control Plane, Venafi Athena combines the strengths of machine learning, large language models and Venafi's industry-leading data capabilities. This makes machine identity management easier and faster for IT security and platform teams. Venafi Athena runs across the entire Venafi Control Plane. The integrated network offers three core functions for…

Read more

When hackers exploit unsecured video conferences 
When hackers exploit unsecured video conferences - Image by Alexandra_Koch on Pixabay

German companies and municipalities risk enormous damage from cyber attacks in the near future. Highly secure video conferences, certified by the BSI, are one aspect that can ward off hacker attacks. Many video platforms have security gaps and make companies vulnerable. The economy currently lacks more than 100.000 specialists for cybersecurity - a need that cannot be met in the foreseeable future. The good news is that companies cannot only increase the security of their IT infrastructure by hiring cybersecurity experts. When securing your own video conferences, for example, it already helps to switch to highly secure software to make life difficult for criminals.

Read more

IoT: Prepared for post-quantum security
IoT: Prepared for Post-Quantum Security - Image by Pete Linforth from Pixabay

Many companies are unprepared for the transition to post-quantum cryptography. Keyfactor aims to use PKI and cryptographic management to guide companies through the transition to post-quantum security, particularly in securing emerging IoT devices. Keyfactor today announced the release of two product updates: EJBCA 8.0 and SignServer 6.0. The updates bring significant advances in IoT (Internet-of-Things) security and lay the foundations for post-quantum readiness, as many organizations see greater security needs and protection against cyberattacks in relation to recent developments in these areas. New Features of EJBCA 8.0 Preparing for Post-Quantum Support of…

Read more

BYOD: security and privacy when working remotely
BYOD: security and privacy when working remotely - Image by Mircea - All in collections on Pixabay

With the unprecedented rise of mobile devices, Bring Your Own Device (BYOD) has become a convenient way of everyday work to access email and other digital data outside of the office. But what about security and privacy? Even those who do not have a business cell phone are often willing to use their private cell phone or tablet to be productive outside of the office. Of course, BYOD also brings new security risks. Even before the pandemic, companies were struggling with the trade-off between employees wanting to work remotely and…

Read more

Managed Services Report: More service for more security
Managed Services Report: More service for more security

The important study for MSPs, “The Evolving Landscape of the MSP Business”, shows that almost one in two MSPs need to upskill to keep up with the latest technology and security trends. On the occasion of Barracuda's recent "Global MSP Day", which includes a series of live and virtual events for MSPs worldwide, the cloud security specialist traditionally announces the results of the sixth edition of its study "The Evolving Landscape of the MSP Business". . The report shows, among other things, how German managed service providers are adapting their service offerings to accommodate the…

Read more

AI cracks passwords faster
B2B Cyber ​​Security ShortNews

HOME SECURITY HEROES company used an AI password cracker called PassGAN to generate a list of over 15,5 million passwords. A matrix shows how quickly an AI can calculate a password that is too weak, so the popular “password” takes exactly 3 seconds. It immediately calculates something like “1234567890”. Unfortunately, many users still use passwords that are far too weak for their services because they can remember them more easily. Employees like to bring this bad habit with them to a company if they are allowed to freely choose their passwords there. All too often administrators make…

Read more

New SaaS-based security solution
New SaaS-based security solution

The F5 Distributed Cloud App Infrastructure Protection (AIP) solution extends application observability and protection to cloud-native infrastructures. Built on the technology acquired with Threat Stack, AIP complements the F5 Distributed Cloud Services portfolio of cloud-native, SaaS-based services for application security and delivery. Companies of all sizes and industries are currently looking to simplify, secure and modernize application-based digital experiences. But many face the challenge of managing distributed and hybrid application infrastructures with workloads spread across on-premises, public cloud, and edge locations. This leads to enormous complexity and increases…

Read more

2022: Hackers discover over 65.000 software vulnerabilities
2022: Hackers discover over 65.000 software vulnerabilities

New Hacker-Powered Security Report from HackerOne: Digital transformation and cloud migration are fueling the rise in security vulnerabilities. Ethical hackers uncovered over 2022 software vulnerabilities in 65.000, a 21 percent increase from the previous year. HackerOne, the security platform for Attack Resistance Management, today released its 2022 Hacker-Powered Security Report. The report shows that the HackerOne community of ethical hackers uncovered over 2022 software vulnerabilities in 65.000, a 21 percent increase from the previous year. 65.000 vulnerabilities fewer reports of vulnerabilities emerging during digital transformation projects recorded…

Read more